Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-16845 (GCVE-0-2020-16845)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T13:45:33.920Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q"
},
{
"name": "openSUSE-SU-2020:1178",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html"
},
{
"name": "openSUSE-SU-2020:1194",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html"
},
{
"name": "FEDORA-2020-e384830a0d",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/"
},
{
"name": "FEDORA-2020-deff052e7a",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/"
},
{
"name": "FEDORA-2020-a55f130272",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/"
},
{
"name": "FEDORA-2020-b190375a37",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/"
},
{
"name": "openSUSE-SU-2020:1405",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html"
},
{
"name": "openSUSE-SU-2020:1407",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html"
},
{
"name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2459-1] golang-1.7 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html"
},
{
"name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2460-1] golang-1.8 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html"
},
{
"name": "DSA-4848",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2021/dsa-4848"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20200924-0002/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-14T17:20:17",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q"
},
{
"name": "openSUSE-SU-2020:1178",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html"
},
{
"name": "openSUSE-SU-2020:1194",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html"
},
{
"name": "FEDORA-2020-e384830a0d",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/"
},
{
"name": "FEDORA-2020-deff052e7a",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/"
},
{
"name": "FEDORA-2020-a55f130272",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/"
},
{
"name": "FEDORA-2020-b190375a37",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/"
},
{
"name": "openSUSE-SU-2020:1405",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html"
},
{
"name": "openSUSE-SU-2020:1407",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html"
},
{
"name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2459-1] golang-1.7 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html"
},
{
"name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2460-1] golang-1.8 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html"
},
{
"name": "DSA-4848",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2021/dsa-4848"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20200924-0002/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-16845",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q",
"refsource": "MISC",
"url": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q"
},
{
"name": "openSUSE-SU-2020:1178",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html"
},
{
"name": "openSUSE-SU-2020:1194",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html"
},
{
"name": "FEDORA-2020-e384830a0d",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/"
},
{
"name": "FEDORA-2020-deff052e7a",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/"
},
{
"name": "FEDORA-2020-a55f130272",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/"
},
{
"name": "FEDORA-2020-b190375a37",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/"
},
{
"name": "openSUSE-SU-2020:1405",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html"
},
{
"name": "openSUSE-SU-2020:1407",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html"
},
{
"name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2459-1] golang-1.7 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html"
},
{
"name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2460-1] golang-1.8 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html"
},
{
"name": "DSA-4848",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-4848"
},
{
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"name": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo"
},
{
"name": "https://security.netapp.com/advisory/ntap-20200924-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20200924-0002/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-16845",
"datePublished": "2020-08-06T17:03:33",
"dateReserved": "2020-08-04T00:00:00",
"dateUpdated": "2024-08-04T13:45:33.920Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2020-16845\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-08-06T18:15:13.700\",\"lastModified\":\"2024-11-21T05:07:15.297\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.\"},{\"lang\":\"es\",\"value\":\"Go versiones anteriores a 1.13.15 y versiones 14.x anteriores a 1.14.7, puede presentar un bucle de lectura infinito en las funciones ReadUvarint y ReadVarint en encoding/binary por medio de entradas no v\u00e1lidas\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-835\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.13.15\",\"matchCriteriaId\":\"C9F4422E-27A3-474D-A4AF-0BEE8AD7293C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.14\",\"versionEndExcluding\":\"1.14.7\",\"matchCriteriaId\":\"9A59FA2E-0F06-4EDF-9E8C-32D6F656EB54\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B009C22E-30A4-4288-BCF6-C3E81DEAF45A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20200924-0002/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4848\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuApr2021.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20200924-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4848\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuApr2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
rhba-2021:0101
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Jaeger 1.20.2.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Jaeger provides these changes:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2021:0101",
"url": "https://access.redhat.com/errata/RHBA-2021:0101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_0101.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Jaeger 1.20.2 Operator/Operand Containers",
"tracking": {
"current_release_date": "2025-11-06T23:51:28+00:00",
"generator": {
"date": "2025-11-06T23:51:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHBA-2021:0101",
"initial_release_date": "2021-01-13T15:41:50+00:00",
"revision_history": [
{
"date": "2021-01-13T15:41:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-13T15:41:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:51:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Jaeger 1.20",
"product": {
"name": "Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jaeger:1.20::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Jaeger"
},
{
"branches": [
{
"category": "product_version",
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"product": {
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"product": {
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"product": {
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.20.2-3"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"product": {
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"product": {
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.20.2-3"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"product": {
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"product": {
"name": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"product_id": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64",
"product": {
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64",
"product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.20.2-2"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64"
},
"product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64"
},
"product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64"
},
"product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64"
},
"product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64"
},
"product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64"
},
"product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64"
},
"product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
},
"product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-13T15:41:50+00:00",
"details": "Red Hat OpenShift Jaeger Release",
"product_ids": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0101"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-13T15:41:50+00:00",
"details": "Red Hat OpenShift Jaeger Release",
"product_ids": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0101"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHBA-2021:0075
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Jaeger 1.17.8.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Jaeger provides these changes:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2021:0075",
"url": "https://access.redhat.com/errata/RHBA-2021:0075"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_0075.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Jaeger 1.17.8 Operator/Operand Containers",
"tracking": {
"current_release_date": "2025-11-06T23:51:28+00:00",
"generator": {
"date": "2025-11-06T23:51:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHBA-2021:0075",
"initial_release_date": "2021-01-12T09:34:21+00:00",
"revision_history": [
{
"date": "2021-01-12T09:34:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-12T09:34:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:51:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Jaeger 1.17",
"product": {
"name": "Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jaeger:1.17::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Jaeger"
},
{
"branches": [
{
"category": "product_version",
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"product": {
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.17.8-12"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"product": {
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.17.8-12"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"product": {
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.17.8-10"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"product": {
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.17.8-11"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"product": {
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.17.8-9"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"product": {
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.17.8-12"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"product": {
"name": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"product_id": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.17.8-10"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64",
"product": {
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64",
"product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.17.8-11"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64"
},
"product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64"
},
"product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64"
},
"product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64"
},
"product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64"
},
"product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64"
},
"product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64"
},
"product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
},
"product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-12T09:34:21+00:00",
"details": "Red Hat OpenShift Jaeger Release",
"product_ids": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-12T09:34:21+00:00",
"details": "Red Hat OpenShift Jaeger Release",
"product_ids": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021_0956
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.6.23 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "ed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.6.23. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:0952\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster\n-between-minor.html#understanding-upgrade-channels_updating-cluster-between\n-minor.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0956",
"url": "https://access.redhat.com/errata/RHSA-2021:0956"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1941433",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941433"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0956.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.23 security update",
"tracking": {
"current_release_date": "2024-11-13T22:20:51+00:00",
"generator": {
"date": "2024-11-13T22:20:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2021:0956",
"initial_release_date": "2021-03-30T16:48:30+00:00",
"revision_history": [
{
"date": "2021-03-30T16:48:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-03-30T16:48:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:20:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"product": {
"name": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"product_id": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"product": {
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"product_id": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"product": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"product": {
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"product_id": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202103210832.p0.git.94284.834ccc7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"product": {
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"product_id": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202103192141.p0.git.0.d1b612b.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-6.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-6.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202103200039.p0.git.3841.3e951a5.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-6.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-6.git7c289cc.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-6.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-6.git7c289cc.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product_id": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202103192141.p0.git.0.d1b612b.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product_id": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.6.0-202103192141.p0.git.0.d1b612b.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src"
},
"product_reference": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src"
},
"product_reference": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src"
},
"product_reference": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src"
},
"product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src"
},
"product_reference": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-30T16:48:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-30T16:48:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-30T16:48:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
}
]
}
rhsa-2020_5605
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated images are now available for Red Hat OpenShift Container Storage 4.6.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nThese updated images include numerous security fixes, bug fixes, and enhancements. \n\nSecurity Fix(es):\n\n* nodejs-node-forge: prototype pollution via the util.setPath function (CVE-2020-7720)\n\n* nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS (CVE-2020-8237)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nUsers are directed to the Red Hat OpenShift Container Storage Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.6/html/4.6_release_notes/index\n\nAll Red Hat OpenShift Container Storage users are advised to upgrade to\nthese updated images.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5605",
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1806266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806266"
},
{
"category": "external",
"summary": "1813506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813506"
},
{
"category": "external",
"summary": "1817438",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817438"
},
{
"category": "external",
"summary": "1817850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817850"
},
{
"category": "external",
"summary": "1827157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827157"
},
{
"category": "external",
"summary": "1829055",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1829055"
},
{
"category": "external",
"summary": "1833153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833153"
},
{
"category": "external",
"summary": "1836299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836299"
},
{
"category": "external",
"summary": "1842254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842254"
},
{
"category": "external",
"summary": "1845976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845976"
},
{
"category": "external",
"summary": "1849771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849771"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1854500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854500"
},
{
"category": "external",
"summary": "1854501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854501"
},
{
"category": "external",
"summary": "1854503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854503"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1858195",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858195"
},
{
"category": "external",
"summary": "1859183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859183"
},
{
"category": "external",
"summary": "1859229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859229"
},
{
"category": "external",
"summary": "1859478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859478"
},
{
"category": "external",
"summary": "1860022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860022"
},
{
"category": "external",
"summary": "1860034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860034"
},
{
"category": "external",
"summary": "1860670",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860670"
},
{
"category": "external",
"summary": "1860848",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860848"
},
{
"category": "external",
"summary": "1861780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861780"
},
{
"category": "external",
"summary": "1865938",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865938"
},
{
"category": "external",
"summary": "1867024",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867024"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1868060",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868060"
},
{
"category": "external",
"summary": "1868703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868703"
},
{
"category": "external",
"summary": "1869411",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869411"
},
{
"category": "external",
"summary": "1870061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870061"
},
{
"category": "external",
"summary": "1870338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870338"
},
{
"category": "external",
"summary": "1870631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870631"
},
{
"category": "external",
"summary": "1872119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872119"
},
{
"category": "external",
"summary": "1872696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872696"
},
{
"category": "external",
"summary": "1873864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873864"
},
{
"category": "external",
"summary": "1874606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874606"
},
{
"category": "external",
"summary": "1875476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875476"
},
{
"category": "external",
"summary": "1877339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877339"
},
{
"category": "external",
"summary": "1877371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877371"
},
{
"category": "external",
"summary": "1878153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878153"
},
{
"category": "external",
"summary": "1878714",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878714"
},
{
"category": "external",
"summary": "1878853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878853"
},
{
"category": "external",
"summary": "1879008",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879008"
},
{
"category": "external",
"summary": "1879072",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879072"
},
{
"category": "external",
"summary": "1879919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879919"
},
{
"category": "external",
"summary": "1880255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880255"
},
{
"category": "external",
"summary": "1881028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881028"
},
{
"category": "external",
"summary": "1881071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881071"
},
{
"category": "external",
"summary": "1882397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882397"
},
{
"category": "external",
"summary": "1883253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883253"
},
{
"category": "external",
"summary": "1883398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883398"
},
{
"category": "external",
"summary": "1883767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883767"
},
{
"category": "external",
"summary": "1883810",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883810"
},
{
"category": "external",
"summary": "1883927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883927"
},
{
"category": "external",
"summary": "1885175",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885175"
},
{
"category": "external",
"summary": "1885428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885428"
},
{
"category": "external",
"summary": "1885648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885648"
},
{
"category": "external",
"summary": "1885971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885971"
},
{
"category": "external",
"summary": "1886308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886308"
},
{
"category": "external",
"summary": "1886348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886348"
},
{
"category": "external",
"summary": "1886551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886551"
},
{
"category": "external",
"summary": "1886709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886709"
},
{
"category": "external",
"summary": "1886859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886859"
},
{
"category": "external",
"summary": "1886873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886873"
},
{
"category": "external",
"summary": "1888583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888583"
},
{
"category": "external",
"summary": "1888593",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888593"
},
{
"category": "external",
"summary": "1888614",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888614"
},
{
"category": "external",
"summary": "1889441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889441"
},
{
"category": "external",
"summary": "1889683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889683"
},
{
"category": "external",
"summary": "1889866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889866"
},
{
"category": "external",
"summary": "1890183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890183"
},
{
"category": "external",
"summary": "1890638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890638"
},
{
"category": "external",
"summary": "1890971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890971"
},
{
"category": "external",
"summary": "1891856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891856"
},
{
"category": "external",
"summary": "1892206",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892206"
},
{
"category": "external",
"summary": "1892234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892234"
},
{
"category": "external",
"summary": "1893624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893624"
},
{
"category": "external",
"summary": "1893691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893691"
},
{
"category": "external",
"summary": "1893714",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893714"
},
{
"category": "external",
"summary": "1895402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895402"
},
{
"category": "external",
"summary": "1896298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896298"
},
{
"category": "external",
"summary": "1896831",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896831"
},
{
"category": "external",
"summary": "1898521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898521"
},
{
"category": "external",
"summary": "1902627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902627"
},
{
"category": "external",
"summary": "1904171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904171"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5605.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6.0 security, bug fix, enhancement update",
"tracking": {
"current_release_date": "2025-01-06T18:49:06+00:00",
"generator": {
"date": "2025-01-06T18:49:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2020:5605",
"initial_release_date": "2020-12-17T19:42:16+00:00",
"revision_history": [
{
"date": "2020-12-17T19:42:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-17T19:42:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T18:49:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product": {
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_container_storage:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Container Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"product_id": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"product_id": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"product_id": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"product_id": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"product_id": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"product_id": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"product_id": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"product_id": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"product_id": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"product_id": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"product_id": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"product_id": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"product_id": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"product_id": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"product_id": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7720",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-09-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1874606"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-node-forge. A Prototype Pollution via the util.setPath function is possible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-node-forge: prototype pollution via the util.setPath function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat Openshift Container Storage 4 the noobaa-core container includes the affected version of node-forge as a dependency of google-p12-pem, however the vulnerable function `util.setPath` is not being used and hence this issue has been rated as having a security impact of Low.\n\nIn OpenShift Container Platform (OCP) the prometheus container is behind OpenShift OAuth restricting access to the vulnerable node-forge library to authenticated users only, therefore the impact is Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-7720"
},
{
"category": "external",
"summary": "RHBZ#1874606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-7720",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7720"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677",
"url": "https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677"
}
],
"release_date": "2020-09-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-node-forge: prototype pollution via the util.setPath function"
},
{
"cve": "CVE-2020-8237",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-09-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1881028"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-json-bigint. A Prototype pollution in json-bigint npm may lead to a denial-of-service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat Openshift Container Storage 4 the noobaa-core container includes the affected version of json-bigint as a dependency of googleapis, however the json-bigint library is not being used and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8237"
},
{
"category": "external",
"summary": "RHBZ#1881028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8237",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8237"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8237",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8237"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/916430",
"url": "https://hackerone.com/reports/916430"
}
],
"release_date": "2020-08-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS"
},
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2020_5118
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.20 is now available with updates to packages and images that fix several bugs.\n\nThis release includes a security update for golang for Red Hat OpenShift Container Platform 4.5.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.5.20. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2020:5119\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nThis update fixes the following bug among others:\n\n* Previously, the Prometheus swagger definition contained a `$ref` property which could not be resolved. This caused a runtime error to occur when using the Prometheus operand creation form. This was fixed by adding a `definitions` property to schema returned by the `definitionFor` helper function so that the `$ref` property can resolve. There are no longer runtime errors when using the Prometheus operand creation form. (BZ#1885228)\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.5.20-x86_64\n\nThe image digest is sha256:78b878986d2d0af6037d637aa63e7b6f80fc8f17d0f0d5b077ac6aca83f792a0\n\n(For s390x architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.5.20-s390x\n\nThe image digest is sha256:372d9aea634d36704d8500a2f940edb3867bfde14c0e5aa19534ea5ac90083d4\n\n(For ppc64le architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.5.20-ppc64le\n\nThe image digest is sha256:030d8323cce90de6bc7ad4119ebb7f000bde06e742f6923faf76707ffe85634a\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5118",
"url": "https://access.redhat.com/errata/RHSA-2020:5118"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1883268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883268"
},
{
"category": "external",
"summary": "1885228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885228"
},
{
"category": "external",
"summary": "1892585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892585"
},
{
"category": "external",
"summary": "1893202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893202"
},
{
"category": "external",
"summary": "1893742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893742"
},
{
"category": "external",
"summary": "1894763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894763"
},
{
"category": "external",
"summary": "1894782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894782"
},
{
"category": "external",
"summary": "1895057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895057"
},
{
"category": "external",
"summary": "1896990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896990"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5118.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.20 bug fix and golang security update",
"tracking": {
"current_release_date": "2024-11-13T22:17:20+00:00",
"generator": {
"date": "2024-11-13T22:17:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2020:5118",
"initial_release_date": "2020-11-24T12:41:33+00:00",
"revision_history": [
{
"date": "2020-11-24T12:41:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-11-24T12:41:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:17:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"product_id": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"product_id": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"product_id": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"product": {
"name": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"product_id": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"product_id": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"product": {
"name": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"product_id": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"product": {
"name": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"product_id": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"product": {
"name": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"product_id": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.5.0-202011070210.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"product": {
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"product_id": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-ipa-downloader-rhel8\u0026tag=v4.5.0-202011070210.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"product_id": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"product_id": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le",
"product": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le",
"product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"product": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"product_id": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"product_id": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"product": {
"name": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"product_id": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"product": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"product_id": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"product": {
"name": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"product_id": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"product": {
"name": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"product_id": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"product": {
"name": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"product_id": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"product": {
"name": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"product_id": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"product": {
"name": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"product_id": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"product_id": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"product": {
"name": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"product_id": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"product": {
"name": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"product_id": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"product": {
"name": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"product_id": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"product": {
"name": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"product_id": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"product": {
"name": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"product_id": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"product": {
"name": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"product_id": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"product": {
"name": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"product_id": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"product_id": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"product_id": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"product": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"product": {
"name": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"product_id": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"product": {
"name": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"product_id": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"product_id": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"product": {
"name": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"product_id": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"product_id": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"product_id": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"product_id": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"product": {
"name": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"product_id": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"product_id": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"product_id": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"product_id": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"product": {
"name": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"product_id": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.5.0-202011132127.p0"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"product_id": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"product_id": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"product_id": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"product": {
"name": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"product_id": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"product_id": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"product": {
"name": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"product_id": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"product": {
"name": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"product_id": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"product": {
"name": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"product_id": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.5.0-202011070210.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"product": {
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"product_id": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-ipa-downloader-rhel8\u0026tag=v4.5.0-202011070210.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"product_id": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"product_id": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"product": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"product": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"product_id": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"product_id": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"product": {
"name": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"product_id": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"product": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"product_id": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"product": {
"name": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"product_id": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"product": {
"name": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"product_id": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"product": {
"name": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"product_id": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"product": {
"name": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"product_id": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"product": {
"name": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"product_id": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"product_id": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"product": {
"name": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"product_id": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"product": {
"name": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"product_id": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"product": {
"name": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"product_id": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"product": {
"name": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"product_id": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"product": {
"name": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"product_id": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"product": {
"name": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"product_id": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"product": {
"name": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"product_id": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"product": {
"name": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"product_id": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"product": {
"name": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"product_id": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"product_id": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"product_id": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"product": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"product": {
"name": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"product_id": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"product": {
"name": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"product_id": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"product_id": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"product": {
"name": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"product_id": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"product_id": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"product_id": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"product_id": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"product": {
"name": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"product_id": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"product_id": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"product_id": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"product_id": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"product": {
"name": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"product_id": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.5.0-202011132127.p0"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"product_id": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"product_id": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"product_id": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"product": {
"name": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"product_id": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"product_id": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"product": {
"name": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"product_id": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"product": {
"name": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"product_id": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"product_id": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"product_id": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"product": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"product_id": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"product_id": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"product": {
"name": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"product_id": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"product": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"product_id": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"product": {
"name": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"product_id": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"product": {
"name": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"product_id": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"product": {
"name": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"product_id": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"product": {
"name": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"product_id": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"product": {
"name": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"product_id": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"product_id": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"product": {
"name": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"product_id": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"product": {
"name": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"product_id": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"product": {
"name": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"product_id": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"product": {
"name": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"product_id": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"product": {
"name": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"product_id": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"product": {
"name": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"product_id": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"product_id": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"product_id": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"product": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"product": {
"name": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"product_id": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"product": {
"name": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"product_id": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"product_id": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"product": {
"name": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"product_id": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"product_id": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"product_id": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"product_id": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"product": {
"name": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"product_id": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"product_id": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"product_id": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"product_id": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"product": {
"name": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"product_id": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.5.0-202011132127.p0"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64"
},
"product_reference": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64"
},
"product_reference": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x"
},
"product_reference": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le"
},
"product_reference": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64"
},
"product_reference": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le"
},
"product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x"
},
"product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64"
},
"product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64"
},
"product_reference": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le"
},
"product_reference": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x"
},
"product_reference": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x"
},
"product_reference": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64"
},
"product_reference": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le"
},
"product_reference": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64"
},
"product_reference": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x"
},
"product_reference": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le"
},
"product_reference": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le"
},
"product_reference": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x"
},
"product_reference": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64"
},
"product_reference": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64"
},
"product_reference": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x"
},
"product_reference": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le"
},
"product_reference": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x"
},
"product_reference": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le"
},
"product_reference": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64"
},
"product_reference": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le"
},
"product_reference": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64"
},
"product_reference": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x"
},
"product_reference": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x"
},
"product_reference": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64"
},
"product_reference": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le"
},
"product_reference": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le"
},
"product_reference": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x"
},
"product_reference": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64"
},
"product_reference": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x"
},
"product_reference": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64"
},
"product_reference": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le"
},
"product_reference": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le"
},
"product_reference": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x"
},
"product_reference": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64"
},
"product_reference": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x"
},
"product_reference": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64"
},
"product_reference": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le"
},
"product_reference": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le"
},
"product_reference": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64"
},
"product_reference": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64"
},
"product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le"
},
"product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x"
},
"product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64"
},
"product_reference": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x"
},
"product_reference": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le"
},
"product_reference": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64"
},
"product_reference": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le"
},
"product_reference": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x"
},
"product_reference": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x"
},
"product_reference": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64"
},
"product_reference": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le"
},
"product_reference": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64"
},
"product_reference": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x"
},
"product_reference": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le"
},
"product_reference": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le"
},
"product_reference": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x"
},
"product_reference": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64"
},
"product_reference": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64"
},
"product_reference": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x"
},
"product_reference": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le"
},
"product_reference": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le"
},
"product_reference": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64"
},
"product_reference": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x"
},
"product_reference": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le"
},
"product_reference": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x"
},
"product_reference": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64"
},
"product_reference": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64"
},
"product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le"
},
"product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le"
},
"product_reference": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64"
},
"product_reference": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64"
},
"product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
},
"product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-24T12:41:33+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5118"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-24T12:41:33+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5118"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2020:4214
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for go-toolset-1.13 and go-toolset-1.13-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* net/http, x/net/http2: http server shutdown doesn\u0027t gracefully shut down HTTP2 connections (BZ#1879236)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:4214",
"url": "https://access.redhat.com/errata/RHSA-2020:4214"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.13_toolset/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.13_toolset/"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4214.json"
}
],
"title": "Red Hat Security Advisory: go-toolset-1.13-golang security and bug fix update",
"tracking": {
"current_release_date": "2025-11-07T15:51:51+00:00",
"generator": {
"date": "2025-11-07T15:51:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:4214",
"initial_release_date": "2020-10-08T10:52:13+00:00",
"revision_history": [
{
"date": "2020-10-08T10:52:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-08T10:52:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T15:51:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:devtools:2020"
}
}
},
{
"category": "product_name",
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:devtools:2020"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Tools"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"product": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"product_id": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"product": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"product": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-race@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-0:1.13.15-1.el7.src",
"product": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.src",
"product_id": "go-toolset-1.13-0:1.13.15-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"product": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"product_id": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"product": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"product_id": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"product": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"product": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"product": {
"name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"product_id": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-docs@1.13.15-3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.src",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch"
},
"product_reference": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.src",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch"
},
"product_reference": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-08T10:52:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4214"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-08T10:52:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4214"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-08T10:52:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4214"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021:0072
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "OpenShift Serverless 1.9.0 release and security update is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Serverless 1.9.0 is a generally available release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform version 4.5.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0072",
"url": "https://access.redhat.com/errata/RHSA-2021:0072"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0072.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Serverless 1.9.0 release and security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:42+00:00",
"generator": {
"date": "2025-11-06T23:52:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:0072",
"initial_release_date": "2021-01-11T21:59:01+00:00",
"revision_history": [
{
"date": "2021-01-11T21:59:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-11T21:59:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Serverless 1.9.0",
"product": {
"name": "OpenShift Serverless 1.9.0",
"product_id": "OpenShift Serverless 1.9.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:serverless:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Serverless"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Serverless 1.9.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-11T21:59:01+00:00",
"details": "See the documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index",
"product_ids": [
"OpenShift Serverless 1.9.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0072"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Serverless 1.9.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Serverless 1.9.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-11T21:59:01+00:00",
"details": "See the documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index",
"product_ids": [
"OpenShift Serverless 1.9.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0072"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Serverless 1.9.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021_0172
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.6.13 is now available with updates to packages and images that fix several bugs.\n\nA security update for cri-o, openshift, openshift-clients, openshift-kuryr, and skopeo is now also available for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4 (CVE-2020-8564)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.6.13. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHSA-2021:0171\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0172",
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1886637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637"
},
{
"category": "external",
"summary": "1917413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917413"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0172.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.13 packages and security update",
"tracking": {
"current_release_date": "2024-11-22T15:52:37+00:00",
"generator": {
"date": "2024-11-22T15:52:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:0172",
"initial_release_date": "2021-01-25T19:45:30+00:00",
"revision_history": [
{
"date": "2021-01-25T19:45:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-25T19:45:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:52:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"product": {
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"product_id": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202101160934.p0.git.94242.fc5242e.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"product": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"product": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"product": {
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"product_id": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"product": {
"name": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"product_id": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202101160934.p0.git.3808.a1bca2f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.1-4.rhaos4.6.git3846aab.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.1-4.rhaos4.6.git3846aab.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.1-4.rhaos4.6.git3846aab.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.1-4.rhaos4.6.git3846aab.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_id": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.1-4.rhaos4.6.git3846aab.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.1-4.rhaos4.6.git3846aab.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src"
},
"product_reference": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le"
},
"product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x"
},
"product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src"
},
"product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64"
},
"product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src"
},
"product_reference": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src"
},
"product_reference": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src"
},
"product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the Kubernetes Product Security Committee"
]
},
{
"names": [
"Nikolaos Moraitis"
],
"organization": "Red Hat",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-8564",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1886637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This can occur with client tools like `kubectl`, or other components that use registry credentials in a docker config file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8564"
},
{
"category": "external",
"summary": "RHBZ#1886637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8564",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564"
},
{
"category": "external",
"summary": "https://github.com/kubernetes/kubernetes/issues/95622",
"url": "https://github.com/kubernetes/kubernetes/issues/95622"
},
{
"category": "external",
"summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk",
"url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk"
}
],
"release_date": "2020-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-25T19:45:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-25T19:45:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-25T19:45:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-25T19:45:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
}
]
}
rhsa-2021:0172
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.6.13 is now available with updates to packages and images that fix several bugs.\n\nA security update for cri-o, openshift, openshift-clients, openshift-kuryr, and skopeo is now also available for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4 (CVE-2020-8564)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.6.13. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHSA-2021:0171\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0172",
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1886637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637"
},
{
"category": "external",
"summary": "1917413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917413"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0172.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.13 packages and security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:44+00:00",
"generator": {
"date": "2025-11-06T23:52:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:0172",
"initial_release_date": "2021-01-25T19:45:30+00:00",
"revision_history": [
{
"date": "2021-01-25T19:45:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-25T19:45:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"product": {
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"product_id": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202101160934.p0.git.94242.fc5242e.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"product": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"product": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"product": {
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"product_id": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"product": {
"name": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"product_id": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202101160934.p0.git.3808.a1bca2f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.1-4.rhaos4.6.git3846aab.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.1-4.rhaos4.6.git3846aab.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.1-4.rhaos4.6.git3846aab.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.1-4.rhaos4.6.git3846aab.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_id": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.1-4.rhaos4.6.git3846aab.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.1-4.rhaos4.6.git3846aab.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src"
},
"product_reference": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le"
},
"product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x"
},
"product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src"
},
"product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64"
},
"product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src"
},
"product_reference": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src"
},
"product_reference": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src"
},
"product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the Kubernetes Product Security Committee"
]
},
{
"names": [
"Nikolaos Moraitis"
],
"organization": "Red Hat",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-8564",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1886637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This can occur with client tools like `kubectl`, or other components that use registry credentials in a docker config file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8564"
},
{
"category": "external",
"summary": "RHBZ#1886637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8564",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564"
},
{
"category": "external",
"summary": "https://github.com/kubernetes/kubernetes/issues/95622",
"url": "https://github.com/kubernetes/kubernetes/issues/95622"
},
{
"category": "external",
"summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk",
"url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk"
}
],
"release_date": "2020-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-25T19:45:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-25T19:45:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-25T19:45:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-25T19:45:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
}
]
}
rhsa-2021_1515
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Openshift Logging Bug Fix Release (5.0.3)\nThis release includes a security update.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Openshift Logging Bug Fix Release (5.0.3)\n\nSecurity Fix(es):\n\n* jackson-databind: arbitrary code execution in slf4j-ext class\n(CVE-2018-14718)\n\n* jackson-databind: arbitrary code execution in blaze-ds-opt and\nblaze-ds-core classes (CVE-2018-14719)\n\n* jackson-databind: improper polymorphic deserialization in\naxis2-transport-jms class (CVE-2018-19360)\n\n* jackson-databind: improper polymorphic deserialization in openjpa class\n(CVE-2018-19361)\n\n* jackson-databind: improper polymorphic deserialization in\njboss-common-core class (CVE-2018-19362)\n\n* jackson-databind: default typing mishandling leading to remote code\nexecution (CVE-2019-14379)\n\n* jackson-databind: Serialization gadgets in\ncom.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.datasources.PerUserPoolDataSource (CVE-2020-35490)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.datasources.SharedPoolDataSource (CVE-2020-35491)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool\n(CVE-2020-35728)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\noadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS (CVE-2020-36179)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS (CVE-2020-36180)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS (CVE-2020-36181)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS (CVE-2020-36182)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-36183)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource\n(CVE-2020-36184)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource\n(CVE-2020-36185)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource\n(CVE-2020-36186)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource\n(CVE-2020-36187)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource\n(CVE-2020-36188)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSourc\ne (CVE-2020-36189)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to javax.swing (CVE-2021-20190)\n\n* jackson-databind: exfiltration/XXE in some JDK classes (CVE-2018-14720)\n\n* jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class\n(CVE-2018-14721)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1515",
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "LOG-1224",
"url": "https://issues.redhat.com/browse/LOG-1224"
},
{
"category": "external",
"summary": "LOG-1232",
"url": "https://issues.redhat.com/browse/LOG-1232"
},
{
"category": "external",
"summary": "LOG-1234",
"url": "https://issues.redhat.com/browse/LOG-1234"
},
{
"category": "external",
"summary": "LOG-1299",
"url": "https://issues.redhat.com/browse/LOG-1299"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1515.json"
}
],
"title": "Red Hat Security Advisory: Openshift Logging Bug Fix Release (5.0.3)",
"tracking": {
"current_release_date": "2024-11-24T21:25:33+00:00",
"generator": {
"date": "2024-11-24T21:25:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1515",
"initial_release_date": "2021-05-06T13:38:14+00:00",
"revision_history": [
{
"date": "2021-05-06T13:38:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-05-06T13:38:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-24T21:25:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Logging 5.0",
"product": {
"name": "OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"product_id": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"product_id": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.0.3-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"product": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.0.3-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"product_id": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"product_id": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64"
},
"product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-14718",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666415"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using slf4j classes. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: arbitrary code execution in slf4j-ext class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in jackson-databind involves exploiting CVE-2018-1088 against slf4j, which was fixed in Red Hat products through the errata referenced at https://access.redhat.com/security/cve/cve-2018-8088. Applications that link only slf4j versions including that fix are not vulnerable to this vulnerability.\n\nRed Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle slf4j-ext jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14718"
},
{
"category": "external",
"summary": "RHBZ#1666415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14718",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718"
}
],
"release_date": "2018-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: arbitrary code execution in slf4j-ext class"
},
{
"cve": "CVE-2018-14719",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666418"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using blaze classes. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products are not affected by this issue as they do not bundle or provide the requisite gadget jars to exploit this vulnerability:\nRed Hat Satellite 6\nRed Hat Enterprise Virtualization 4\nRed Hat Fuse 6, 7, and Fuse Integration Services 2\nRed Hat A-MQ 6",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14719"
},
{
"category": "external",
"summary": "RHBZ#1666418",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14719",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719"
}
],
"release_date": "2018-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes"
},
{
"cve": "CVE-2018-14720",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666423"
}
],
"notes": [
{
"category": "description",
"text": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: exfiltration/XXE in some JDK classes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.\n\nRed Hat Enterprise Virtualization 4 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14720"
},
{
"category": "external",
"summary": "RHBZ#1666423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14720",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720"
}
],
"release_date": "2018-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible \n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: exfiltration/XXE in some JDK classes"
},
{
"cve": "CVE-2018-14721",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666428"
}
],
"notes": [
{
"category": "description",
"text": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle axis2-jaxws jar.\n\nRed Hat Virtualization is not affected by this issue, since its does not bundle axis2-jaxws jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14721"
},
{
"category": "external",
"summary": "RHBZ#1666428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721"
}
],
"release_date": "2018-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class"
},
{
"cve": "CVE-2018-19360",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the axis2-transport-jms class. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t include axis2-transport-jms jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include axis2-transport-jms jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-19360"
},
{
"category": "external",
"summary": "RHBZ#1666482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-19360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19360"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360"
}
],
"release_date": "2018-11-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class"
},
{
"cve": "CVE-2018-19361",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666484"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the OpenJPA class. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: improper polymorphic deserialization in openjpa class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-19361"
},
{
"category": "external",
"summary": "RHBZ#1666484",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-19361",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19361"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361"
}
],
"release_date": "2018-11-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: improper polymorphic deserialization in openjpa class"
},
{
"cve": "CVE-2018-19362",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the jboss-common-core class. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: improper polymorphic deserialization in jboss-common-core class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-19362"
},
{
"category": "external",
"summary": "RHBZ#1666489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-19362",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362"
}
],
"release_date": "2018-11-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: improper polymorphic deserialization in jboss-common-core class"
},
{
"cve": "CVE-2019-14379",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-07-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1737517"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: default typing mishandling leading to remote code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14379"
},
{
"category": "external",
"summary": "RHBZ#1737517",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14379"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379"
}
],
"release_date": "2019-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: default typing mishandling leading to remote code execution"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-24750",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2020-09-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1882310"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.6. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* OpenShift Container Platform\nThese products may update the jackson-databind dependency in a future release.\n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24750"
},
{
"category": "external",
"summary": "RHBZ#1882310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750"
}
],
"release_date": "2020-09-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid com.pastdev.httpcomponents in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration"
},
{
"cve": "CVE-2020-35490",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2020-12-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1909266"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update.\n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35490"
},
{
"category": "external",
"summary": "RHBZ#1909266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909266"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35490",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35490"
},
{
"category": "external",
"summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
"url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2986",
"url": "https://github.com/FasterXML/jackson-databind/issues/2986"
}
],
"release_date": "2020-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid org.apache.commons.dbcp2.datasources.PerUserPoolDataSource and org.apache.commons.dbcp2.datasources.SharedPoolDataSource in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource"
},
{
"cve": "CVE-2020-35491",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2020-12-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1909269"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35491"
},
{
"category": "external",
"summary": "RHBZ#1909269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909269"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35491",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35491"
},
{
"category": "external",
"summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
"url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2986",
"url": "https://github.com/FasterXML/jackson-databind/issues/2986"
}
],
"release_date": "2020-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid org.apache.commons.dbcp2.datasources.PerUserPoolDataSource and org.apache.commons.dbcp2.datasources.SharedPoolDataSource in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource"
},
{
"cve": "CVE-2020-35728",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2020-12-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1911502"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat Products ship jackson-databind version 2.10.0 or later which is not considered affected by this CVE (see https://medium.com/@cowtowncoder/jackson-2-10-safe-default-typing-2d018f0ce2ba) \n* JBoss Data Grid 7\n* JBoss Data Grid 8\n* Enterprise Application Platform 7\n* Red Hat Decision Manager 7\n* Red Hat Process Automation Manager 7\n* Red Hat Single Sign-On (RH-SSO) 7\n* Red Hat JBoss Fuse 7\n* Red Hat JBoss A-MQ\n* Red Hat Enterprise Linux 8\n* Red Hat Satellite 6.6\n* Red Hat Satellite 6.7\n* Red Hat Satellite 6.8\n* Red Hat CodeReady Studio 12\n\nRed Hat OpenShift Container Platform and Red Hat OpenStack Platform does ship the vulnerable components, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update.\n\nRed Hat OpenStack Platform 13 ships OpenDaylight, which contains the vulnerable jackson-databind, but does not expose jackson-databind in a way that would make it exploitable. As such, Red Hat will not be providing a fix for OpenDaylight at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35728"
},
{
"category": "external",
"summary": "RHBZ#1911502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35728"
},
{
"category": "external",
"summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
"url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2999",
"url": "https://github.com/FasterXML/jackson-databind/issues/2999"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool"
},
{
"cve": "CVE-2020-36179",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913871"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36179"
},
{
"category": "external",
"summary": "RHBZ#1913871",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913871"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36179",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36179"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3004",
"url": "https://github.com/FasterXML/jackson-databind/issues/3004"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS"
},
{
"cve": "CVE-2020-36180",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36180"
},
{
"category": "external",
"summary": "RHBZ#1913872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36180",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36180"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3004",
"url": "https://github.com/FasterXML/jackson-databind/issues/3004"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS"
},
{
"cve": "CVE-2020-36181",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913874"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but does not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36181"
},
{
"category": "external",
"summary": "RHBZ#1913874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913874"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36181",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36181"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3004",
"url": "https://github.com/FasterXML/jackson-databind/issues/3004"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS"
},
{
"cve": "CVE-2020-36182",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913926"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36182"
},
{
"category": "external",
"summary": "RHBZ#1913926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913926"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36182"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3004",
"url": "https://github.com/FasterXML/jackson-databind/issues/3004"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS"
},
{
"cve": "CVE-2020-36183",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913927"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36183"
},
{
"category": "external",
"summary": "RHBZ#1913927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36183"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3003",
"url": "https://github.com/FasterXML/jackson-databind/issues/3003"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool"
},
{
"cve": "CVE-2020-36184",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913928"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36184"
},
{
"category": "external",
"summary": "RHBZ#1913928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36184",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36184"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2998",
"url": "https://github.com/FasterXML/jackson-databind/issues/2998"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource"
},
{
"cve": "CVE-2020-36185",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913929"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36185"
},
{
"category": "external",
"summary": "RHBZ#1913929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913929"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36185"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2998",
"url": "https://github.com/FasterXML/jackson-databind/issues/2998"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource"
},
{
"cve": "CVE-2020-36186",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913931"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contain the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36186"
},
{
"category": "external",
"summary": "RHBZ#1913931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36186"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2997",
"url": "https://github.com/FasterXML/jackson-databind/issues/2997"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource"
},
{
"cve": "CVE-2020-36187",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913933"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contain the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36187"
},
{
"category": "external",
"summary": "RHBZ#1913933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913933"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36187",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36187"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2997",
"url": "https://github.com/FasterXML/jackson-databind/issues/2997"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource"
},
{
"cve": "CVE-2020-36188",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913934"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but they do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36188"
},
{
"category": "external",
"summary": "RHBZ#1913934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36188"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2996",
"url": "https://github.com/FasterXML/jackson-databind/issues/2996"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource"
},
{
"cve": "CVE-2020-36189",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913937"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36189"
},
{
"category": "external",
"summary": "RHBZ#1913937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913937"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36189"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2996",
"url": "https://github.com/FasterXML/jackson-databind/issues/2996"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource"
},
{
"cve": "CVE-2021-20190",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2020-01-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1916633"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* CodeReady WorkSpaces Server Container\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20190"
},
{
"category": "external",
"summary": "RHBZ#1916633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20190"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-5949-rw7g-wx7w",
"url": "https://github.com/advisories/GHSA-5949-rw7g-wx7w"
}
],
"release_date": "2021-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid javax.swing in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing"
}
]
}
rhba-2020_5356
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.23 is now available with\nupdates to packages and images that fix several bugs.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.5.23. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHSA-2020:5359\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:5356",
"url": "https://access.redhat.com/errata/RHBA-2020:5356"
},
{
"category": "external",
"summary": "1905005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905005"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_5356.json"
}
],
"title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.23 packages update",
"tracking": {
"current_release_date": "2024-11-13T22:07:43+00:00",
"generator": {
"date": "2024-11-13T22:07:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHBA-2020:5356",
"initial_release_date": "2020-12-15T19:37:22+00:00",
"revision_history": [
{
"date": "2020-12-15T19:37:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-15T19:37:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:07:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"product": {
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"product_id": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"product": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"product": {
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"product_id": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"product": {
"name": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"product_id": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"product": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"product": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"product": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src"
},
"product_reference": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le"
},
"product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x"
},
"product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src"
},
"product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
},
"product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src"
},
"product_reference": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src"
},
"product_reference": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-15T19:37:22+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:5356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-15T19:37:22+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:5356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhba-2020_4229
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.15 is now available with\nupdates to packages and images that fix several bugs.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.5.15. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2020:4228\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:4229",
"url": "https://access.redhat.com/errata/RHBA-2020:4229"
},
{
"category": "external",
"summary": "1887283",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887283"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_4229.json"
}
],
"title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.15 packages update",
"tracking": {
"current_release_date": "2024-11-13T22:07:20+00:00",
"generator": {
"date": "2024-11-13T22:07:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHBA-2020:4229",
"initial_release_date": "2020-10-19T13:42:49+00:00",
"revision_history": [
{
"date": "2020-10-19T13:42:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-19T13:42:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:07:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"product": {
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"product_id": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"product": {
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"product_id": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202010081312.p0.git.0.401534e.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"product": {
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"product_id": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"product": {
"name": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"product_id": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"product": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"product": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_id": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"product": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"product": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-selftests-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product_id": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202010081312.p0.git.0.401534e.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product_id": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.5.0-202010081312.p0.git.0.401534e.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.24.1.el8_2.dt1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_id": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.24.1.el8_2.dt1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src"
},
"product_reference": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src"
},
"product_reference": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le"
},
"product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x"
},
"product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src"
},
"product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64"
},
"product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src"
},
"product_reference": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src"
},
"product_reference": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-19T13:42:49+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4229"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-19T13:42:49+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4229"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2020_5649
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for OpenShift Service Mesh 1.1.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5649",
"url": "https://access.redhat.com/errata/RHSA-2020:5649"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5649.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1.11 security update",
"tracking": {
"current_release_date": "2024-11-13T22:17:40+00:00",
"generator": {
"date": "2024-11-13T22:17:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2020:5649",
"initial_release_date": "2020-12-22T04:53:46+00:00",
"revision_history": [
{
"date": "2020-12-22T04:53:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-22T04:53:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:17:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Service Mesh 1.1",
"product": {
"name": "OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:1.1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "ior-0:1.1.11-2.el8.src",
"product": {
"name": "ior-0:1.1.11-2.el8.src",
"product_id": "ior-0:1.1.11-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ior@1.1.11-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-20.el8.src",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-20.el8.src",
"product_id": "servicemesh-prometheus-0:2.14.0-20.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-20.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:1.1.11-2.el8.src",
"product": {
"name": "servicemesh-cni-0:1.1.11-2.el8.src",
"product_id": "servicemesh-cni-0:1.1.11-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@1.1.11-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:1.1.11-2.el8.src",
"product": {
"name": "servicemesh-0:1.1.11-2.el8.src",
"product_id": "servicemesh-0:1.1.11-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@1.1.11-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-19.el8.src",
"product": {
"name": "servicemesh-grafana-0:6.4.3-19.el8.src",
"product_id": "servicemesh-grafana-0:6.4.3-19.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-19.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:1.1.11-3.el8.src",
"product": {
"name": "servicemesh-operator-0:1.1.11-3.el8.src",
"product_id": "servicemesh-operator-0:1.1.11-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@1.1.11-3.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ior-0:1.1.11-2.el8.x86_64",
"product": {
"name": "ior-0:1.1.11-2.el8.x86_64",
"product_id": "ior-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ior@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"product_id": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-20.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-cni-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-cni-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-citadel@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-galley-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-galley-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-galley-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-galley@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-sidecar-injector@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"product": {
"name": "servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"product_id": "servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-19.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"product": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"product_id": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-19.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:1.1.11-3.el8.x86_64",
"product": {
"name": "servicemesh-operator-0:1.1.11-3.el8.x86_64",
"product_id": "servicemesh-operator-0:1.1.11-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@1.1.11-3.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ior-0:1.1.11-2.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src"
},
"product_reference": "ior-0:1.1.11-2.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ior-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64"
},
"product_reference": "ior-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:1.1.11-2.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src"
},
"product_reference": "servicemesh-0:1.1.11-2.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-citadel-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:1.1.11-2.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src"
},
"product_reference": "servicemesh-cni-0:1.1.11-2.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-cni-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-galley-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-galley-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-19.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src"
},
"product_reference": "servicemesh-grafana-0:6.4.3-19.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-19.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64"
},
"product_reference": "servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64"
},
"product_reference": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:1.1.11-3.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src"
},
"product_reference": "servicemesh-operator-0:1.1.11-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:1.1.11-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64"
},
"product_reference": "servicemesh-operator-0:1.1.11-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-20.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-20.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-22T04:53:46+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5649"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-22T04:53:46+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5649"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2021:0799
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for RHEL-8-CNV-2.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 2.6.0 images:\n\nRHEL-8-CNV-2.6\n==============\nkubevirt-cpu-node-labeller-container-v2.6.0-5\nkubevirt-cpu-model-nfd-plugin-container-v2.6.0-5\nnode-maintenance-operator-container-v2.6.0-13\nkubevirt-vmware-container-v2.6.0-5\nvirtio-win-container-v2.6.0-5\nkubevirt-kvm-info-nfd-plugin-container-v2.6.0-5\nbridge-marker-container-v2.6.0-9\nkubevirt-template-validator-container-v2.6.0-9\nkubevirt-v2v-conversion-container-v2.6.0-6\nkubemacpool-container-v2.6.0-13\nkubevirt-ssp-operator-container-v2.6.0-40\nhyperconverged-cluster-webhook-container-v2.6.0-73\nhyperconverged-cluster-operator-container-v2.6.0-73\novs-cni-plugin-container-v2.6.0-10\ncnv-containernetworking-plugins-container-v2.6.0-10\novs-cni-marker-container-v2.6.0-10\ncluster-network-addons-operator-container-v2.6.0-16\nhostpath-provisioner-container-v2.6.0-11\nhostpath-provisioner-operator-container-v2.6.0-14\nvm-import-virtv2v-container-v2.6.0-21\nkubernetes-nmstate-handler-container-v2.6.0-19\nvm-import-controller-container-v2.6.0-21\nvm-import-operator-container-v2.6.0-21\nvirt-api-container-v2.6.0-111\nvirt-controller-container-v2.6.0-111\nvirt-handler-container-v2.6.0-111\nvirt-operator-container-v2.6.0-111\nvirt-launcher-container-v2.6.0-111\ncnv-must-gather-container-v2.6.0-54\nvirt-cdi-importer-container-v2.6.0-24\nvirt-cdi-cloner-container-v2.6.0-24\nvirt-cdi-controller-container-v2.6.0-24\nvirt-cdi-uploadserver-container-v2.6.0-24\nvirt-cdi-apiserver-container-v2.6.0-24\nvirt-cdi-uploadproxy-container-v2.6.0-24\nvirt-cdi-operator-container-v2.6.0-24\nhco-bundle-registry-container-v2.6.0-582\n\nSecurity Fix(es):\n\n* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)\n\n* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)\n\n* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\n* containernetworking-cni: Arbitrary path injection via type field in CNI configuration (CVE-2021-20206)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0799",
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1732329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732329"
},
{
"category": "external",
"summary": "1783192",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783192"
},
{
"category": "external",
"summary": "1791753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791753"
},
{
"category": "external",
"summary": "1804533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533"
},
{
"category": "external",
"summary": "1848954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848954"
},
{
"category": "external",
"summary": "1848956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848956"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1853911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853911"
},
{
"category": "external",
"summary": "1854098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854098"
},
{
"category": "external",
"summary": "1856347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856347"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1859235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859235"
},
{
"category": "external",
"summary": "1860714",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860714"
},
{
"category": "external",
"summary": "1860992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860992"
},
{
"category": "external",
"summary": "1864577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1864577"
},
{
"category": "external",
"summary": "1866593",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1866593"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1868817",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868817"
},
{
"category": "external",
"summary": "1873771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873771"
},
{
"category": "external",
"summary": "1874812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874812"
},
{
"category": "external",
"summary": "1878499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878499"
},
{
"category": "external",
"summary": "1879108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879108"
},
{
"category": "external",
"summary": "1881874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881874"
},
{
"category": "external",
"summary": "1883232",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883232"
},
{
"category": "external",
"summary": "1883371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371"
},
{
"category": "external",
"summary": "1885153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885153"
},
{
"category": "external",
"summary": "1885418",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885418"
},
{
"category": "external",
"summary": "1887398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887398"
},
{
"category": "external",
"summary": "1889295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889295"
},
{
"category": "external",
"summary": "1891285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891285"
},
{
"category": "external",
"summary": "1891440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891440"
},
{
"category": "external",
"summary": "1892227",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892227"
},
{
"category": "external",
"summary": "1893278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893278"
},
{
"category": "external",
"summary": "1893646",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893646"
},
{
"category": "external",
"summary": "1894428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894428"
},
{
"category": "external",
"summary": "1894824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894824"
},
{
"category": "external",
"summary": "1894897",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894897"
},
{
"category": "external",
"summary": "1895414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895414"
},
{
"category": "external",
"summary": "1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "1898072",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898072"
},
{
"category": "external",
"summary": "1898840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898840"
},
{
"category": "external",
"summary": "1899558",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899558"
},
{
"category": "external",
"summary": "1901480",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901480"
},
{
"category": "external",
"summary": "1902046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902046"
},
{
"category": "external",
"summary": "1902111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111"
},
{
"category": "external",
"summary": "1903014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903014"
},
{
"category": "external",
"summary": "1903585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903585"
},
{
"category": "external",
"summary": "1904797",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904797"
},
{
"category": "external",
"summary": "1907151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907151"
},
{
"category": "external",
"summary": "1907352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907352"
},
{
"category": "external",
"summary": "1907691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907691"
},
{
"category": "external",
"summary": "1907988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907988"
},
{
"category": "external",
"summary": "1908363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908363"
},
{
"category": "external",
"summary": "1908421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908421"
},
{
"category": "external",
"summary": "1908883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883"
},
{
"category": "external",
"summary": "1909458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909458"
},
{
"category": "external",
"summary": "1910857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910857"
},
{
"category": "external",
"summary": "1911118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911118"
},
{
"category": "external",
"summary": "1911396",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911396"
},
{
"category": "external",
"summary": "1911662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911662"
},
{
"category": "external",
"summary": "1912908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912908"
},
{
"category": "external",
"summary": "1913248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913248"
},
{
"category": "external",
"summary": "1913320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913320"
},
{
"category": "external",
"summary": "1913717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913717"
},
{
"category": "external",
"summary": "1913756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913756"
},
{
"category": "external",
"summary": "1914177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914177"
},
{
"category": "external",
"summary": "1914608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914608"
},
{
"category": "external",
"summary": "1914947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914947"
},
{
"category": "external",
"summary": "1917908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917908"
},
{
"category": "external",
"summary": "1917963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917963"
},
{
"category": "external",
"summary": "1919391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391"
},
{
"category": "external",
"summary": "1920576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920576"
},
{
"category": "external",
"summary": "1920610",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920610"
},
{
"category": "external",
"summary": "1921650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650"
},
{
"category": "external",
"summary": "1923979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923979"
},
{
"category": "external",
"summary": "1927373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927373"
},
{
"category": "external",
"summary": "1906199",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906199"
},
{
"category": "external",
"summary": "1931376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931376"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0799.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 2.6.0 security and bug fix update",
"tracking": {
"current_release_date": "2025-11-07T15:52:02+00:00",
"generator": {
"date": "2025-11-07T15:52:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:0799",
"initial_release_date": "2021-03-10T11:41:12+00:00",
"revision_history": [
{
"date": "2021-03-10T11:41:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-03-10T11:41:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T15:52:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 2.6 for RHEL 8",
"product": {
"name": "CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-model-nfd-plugin\u0026tag=v2.6.0-9"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-node-labeller\u0026tag=v2.6.0-7"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"product_id": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-kvm-info-nfd-plugin\u0026tag=v2.6.0-7"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v2.6.0-25"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product_id": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller\u0026tag=v2.6.0-25"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-9283",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2020-02-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1804533"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the SSH package of the golang.org/x/crypto library. An attacker could exploit this flaw by supplying crafted SSH ed25519 keys to cause a crash in applications that use this package as either an SSH client or server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform uses the vulnerable library in a number of components but strictly as an SSH client. The severity of this vulnerability is reduced for clients as it requires connections to malicious SSH servers, with the maximum impact only a client crash. This vulnerability is rated Low for OpenShift Container Platform.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9283"
},
{
"category": "external",
"summary": "RHBZ#1804533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9283",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9283"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY",
"url": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY"
}
],
"release_date": "2020-02-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic"
},
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-26160",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2020-09-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1883371"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in jwt-go where it is vulnerable to Access Restriction Bypass if m[\"aud\"] happens to be []string{}, as allowed by the spec, the type assertion fails and the value of aud is \"\". This can cause audience verification to succeed even if the audiences being passed are incorrect if required is set to false.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jwt-go: access restriction bypass vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The github.com/dgrijalva/jwt-go module is an indirect dependency of the k8s.io/client-go module pulled into Quay Bridge, and Setup operators via the Operator\u0027s SDK generated code. The k8s.io/client-go module does not use jwt-go in an unsafe way [1]. Red Hat Quay components have been marked as wontfix. This may be fixed in the future.\n\nSimilar to Quay, multiple OpenShift Container Platform (OCP) containers include jwt-go as a transient dependency due to go-autorest [1]. As such, those containers do not use jwt-go in an unsafe way. They have been marked wontfix at this time and may be fixed in a future update.\n\nSame as Quay and OpenShift Container Platform, components shipped with Red Hat OpenShift Container Storage 4 do not use jwt-go in an unsafe way and hence this issue has been rated as having a security impact of Low. A future update may address this issue.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli as a technical preview and is not currently planned to be addressed in future updates, hence the multi-cloud-object-gateway-cli package will not be fixed.\n\n[1] https://github.com/Azure/go-autorest/issues/568#issuecomment-703804062",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26160"
},
{
"category": "external",
"summary": "RHBZ#1883371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26160",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26160"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515",
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jwt-go: access restriction bypass vulnerability"
},
{
"cve": "CVE-2020-27813",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-11-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902111"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker could use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang-github-gorilla-websocket: integer overflow leads to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27813"
},
{
"category": "external",
"summary": "RHBZ#1902111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27813",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27813"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813"
},
{
"category": "external",
"summary": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh",
"url": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh"
}
],
"release_date": "2019-08-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang-github-gorilla-websocket: integer overflow leads to denial of service"
},
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
},
{
"cve": "CVE-2020-29652",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908883"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference vulnerability was found in golang. When using the library\u0027s ssh server without specifying an option for GSSAPIWithMICConfig, it is possible for an attacker to craft an ssh client connection using the `gssapi-with-mic` authentication method and cause the server to panic resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A large number of products include the affected package, but do not make use of the vulnerable SSH server code. Accordingly, the flaw itself is rated as \"Important\", but these products themselves all have a \"Low\" severity rating.\n\nAdditionally, a number of products include golang.org/x/crypto (or even golang.org/x/crypto/ssh/terminal) but not specifically golang.org/x/crypto/ssh/server.go in the final build. As this would result in a very large number of entries of not affected products, only products which include the ssh server code (golang.org/x/crypto/ssh/server.go) have been represented here. \n\nRed Hat Enterprise Linux 8 container-tools:rhel8/containernetworking-plugins is not affected because although it uses some functionality from golang.org/x/crypto, it does not use or import anything from golang.org/x/crypto/ssh/*.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29652"
},
{
"category": "external",
"summary": "RHBZ#1908883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29652",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29652"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1"
}
],
"release_date": "2020-12-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference"
},
{
"cve": "CVE-2021-3121",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921650"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3121"
},
{
"category": "external",
"summary": "RHBZ#1921650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121"
}
],
"release_date": "2021-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation"
},
{
"acknowledgments": [
{
"names": [
"Casey Callendrello"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-20206",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2021-01-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919391"
}
],
"notes": [
{
"category": "description",
"text": "An improper limitation of path name flaw was found in containernetworking/cni. When specifying the plugin to load in the `type` field in the network configuration, it is possible to use special elements such as \"../\" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as `reboot`. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "containernetworking-cni: Arbitrary path injection via type field in CNI configuration",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) does package a vulnerable version of containernetworking/cni, however, the NetworkDefinitionAttachment is defined in code and cannot be easily changed except through a user who has access to the operator namespace such as cluster-admin. As such, for OSSM, the impact is Moderate.\n\nThe fix for podman was released as a part of OpenShift 4.8 and is included in future releases.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20206"
},
{
"category": "external",
"summary": "RHBZ#1919391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20206",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20206"
}
],
"release_date": "2021-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "containernetworking-cni: Arbitrary path injection via type field in CNI configuration"
}
]
}
rhba-2020:5123
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.4.31 is now available with updates to packages and images that fix several bugs.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.4.31. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2020:5122\n\nAll OpenShift Container Platform 4.4 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:5123",
"url": "https://access.redhat.com/errata/RHBA-2020:5123"
},
{
"category": "external",
"summary": "1897975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897975"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_5123.json"
}
],
"title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.4.31 packages update",
"tracking": {
"current_release_date": "2025-11-06T23:51:27+00:00",
"generator": {
"date": "2025-11-06T23:51:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHBA-2020:5123",
"initial_release_date": "2020-12-02T16:36:58+00:00",
"revision_history": [
{
"date": "2020-12-02T16:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-02T16:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:51:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.4",
"product": {
"name": "Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.4",
"product": {
"name": "Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.4::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "iptables-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-arptables@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-devel@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-ebtables@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-libs@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-services@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-utils@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-debugsource@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-debuginfo@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-libs-debuginfo@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-utils-debuginfo@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.4.0-202011122017.p0.git.3445.6937a03.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.x86_64",
"product": {
"name": "faq-0:0.0.6-5.el7.x86_64",
"product_id": "faq-0:0.0.6-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "iptables-0:1.8.4-10.el8_2.4.src",
"product": {
"name": "iptables-0:1.8.4-10.el8_2.4.src",
"product_id": "iptables-0:1.8.4-10.el8_2.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables@1.8.4-10.el8_2.4?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"product": {
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"product_id": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.4.0-202011130111.p0.git.0.4861dfa.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.src",
"product": {
"name": "faq-0:0.0.6-5.el7.src",
"product_id": "faq-0:0.0.6-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"product": {
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"product_id": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"product": {
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"product_id": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.4.0-202011122017.p0.git.0.2755c9b.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.ppc64le",
"product": {
"name": "faq-0:0.0.6-5.el7.ppc64le",
"product_id": "faq-0:0.0.6-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.s390x",
"product": {
"name": "faq-0:0.0.6-5.el7.s390x",
"product_id": "faq-0:0.0.6-5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product_id": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.4.0-202011122017.p0.git.0.2755c9b.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product_id": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.4.0-202011122017.p0.git.0.2755c9b.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le"
},
"product_reference": "faq-0:0.0.6-5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x"
},
"product_reference": "faq-0:0.0.6-5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src"
},
"product_reference": "faq-0:0.0.6-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64"
},
"product_reference": "faq-0:0.0.6-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src"
},
"product_reference": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src"
},
"product_reference": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-0:1.8.4-10.el8_2.4.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src"
},
"product_reference": "iptables-0:1.8.4-10.el8_2.4.src",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-services-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src"
},
"product_reference": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-02T16:36:58+00:00",
"details": "For OpenShift Container Platform 4.4 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:5123"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-02T16:36:58+00:00",
"details": "For OpenShift Container Platform 4.4 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:5123"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2021:0713
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.34 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release also includes a security update for Red Hat OpenShift Container Platform 4.5.\n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.5.34. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2021:0714\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0713",
"url": "https://access.redhat.com/errata/RHSA-2021:0713"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1934454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934454"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0713.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.34 packages and security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:51+00:00",
"generator": {
"date": "2025-11-06T23:52:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:0713",
"initial_release_date": "2021-03-11T04:48:46+00:00",
"revision_history": [
{
"date": "2021-03-11T04:48:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-03-11T04:48:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"product": {
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"product_id": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el8.src",
"product": {
"name": "cri-tools-0:1.18.0-4.el8.src",
"product_id": "cri-tools-0:1.18.0-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.src",
"product": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.src",
"product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "apb-0:2.0.3-3.el7.src",
"product": {
"name": "apb-0:2.0.3-3.el7.src",
"product_id": "apb-0:2.0.3-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el7.src",
"product": {
"name": "cri-tools-0:1.18.0-4.el7.src",
"product_id": "cri-tools-0:1.18.0-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"product": {
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"product_id": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el8.x86_64",
"product": {
"name": "cri-tools-0:1.18.0-4.el8.x86_64",
"product_id": "cri-tools-0:1.18.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"product_id": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "apb-0:2.0.3-3.el7.x86_64",
"product": {
"name": "apb-0:2.0.3-3.el7.x86_64",
"product_id": "apb-0:2.0.3-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el7.x86_64",
"product": {
"name": "cri-tools-0:1.18.0-4.el7.x86_64",
"product_id": "cri-tools-0:1.18.0-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el8.ppc64le",
"product": {
"name": "cri-tools-0:1.18.0-4.el8.ppc64le",
"product_id": "cri-tools-0:1.18.0-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"product_id": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "apb-0:2.0.3-3.el7.ppc64le",
"product": {
"name": "apb-0:2.0.3-3.el7.ppc64le",
"product_id": "apb-0:2.0.3-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el7.ppc64le",
"product": {
"name": "cri-tools-0:1.18.0-4.el7.ppc64le",
"product_id": "cri-tools-0:1.18.0-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_id": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el8.s390x",
"product": {
"name": "cri-tools-0:1.18.0-4.el8.s390x",
"product_id": "cri-tools-0:1.18.0-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"product_id": "cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "apb-0:2.0.3-3.el7.s390x",
"product": {
"name": "apb-0:2.0.3-3.el7.s390x",
"product_id": "apb-0:2.0.3-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el7.s390x",
"product": {
"name": "cri-tools-0:1.18.0-4.el7.s390x",
"product_id": "cri-tools-0:1.18.0-4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apb-container-scripts-0:2.0.3-3.el7.noarch",
"product": {
"name": "apb-container-scripts-0:2.0.3-3.el7.noarch",
"product_id": "apb-container-scripts-0:2.0.3-3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb-container-scripts@2.0.3-3.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apb-devel-0:2.0.3-3.el7.noarch",
"product": {
"name": "apb-devel-0:2.0.3-3.el7.noarch",
"product_id": "apb-devel-0:2.0.3-3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb-devel@2.0.3-3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-0:2.0.3-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le"
},
"product_reference": "apb-0:2.0.3-3.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-0:2.0.3-3.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x"
},
"product_reference": "apb-0:2.0.3-3.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-0:2.0.3-3.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src"
},
"product_reference": "apb-0:2.0.3-3.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-0:2.0.3-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64"
},
"product_reference": "apb-0:2.0.3-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-container-scripts-0:2.0.3-3.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch"
},
"product_reference": "apb-container-scripts-0:2.0.3-3.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-devel-0:2.0.3-3.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch"
},
"product_reference": "apb-devel-0:2.0.3-3.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le"
},
"product_reference": "cri-tools-0:1.18.0-4.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x"
},
"product_reference": "cri-tools-0:1.18.0-4.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src"
},
"product_reference": "cri-tools-0:1.18.0-4.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64"
},
"product_reference": "cri-tools-0:1.18.0-4.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src"
},
"product_reference": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src"
},
"product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le"
},
"product_reference": "cri-tools-0:1.18.0-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x"
},
"product_reference": "cri-tools-0:1.18.0-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src"
},
"product_reference": "cri-tools-0:1.18.0-4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64"
},
"product_reference": "cri-tools-0:1.18.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src"
},
"product_reference": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-11T04:48:46+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-11T04:48:46+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2020:4214
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for go-toolset-1.13 and go-toolset-1.13-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* net/http, x/net/http2: http server shutdown doesn\u0027t gracefully shut down HTTP2 connections (BZ#1879236)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:4214",
"url": "https://access.redhat.com/errata/RHSA-2020:4214"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.13_toolset/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.13_toolset/"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4214.json"
}
],
"title": "Red Hat Security Advisory: go-toolset-1.13-golang security and bug fix update",
"tracking": {
"current_release_date": "2025-11-07T15:51:51+00:00",
"generator": {
"date": "2025-11-07T15:51:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:4214",
"initial_release_date": "2020-10-08T10:52:13+00:00",
"revision_history": [
{
"date": "2020-10-08T10:52:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-08T10:52:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T15:51:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:devtools:2020"
}
}
},
{
"category": "product_name",
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:devtools:2020"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Tools"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"product": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"product_id": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"product": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"product": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-race@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-0:1.13.15-1.el7.src",
"product": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.src",
"product_id": "go-toolset-1.13-0:1.13.15-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"product": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"product_id": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"product": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"product_id": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"product": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"product": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"product": {
"name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"product_id": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-docs@1.13.15-3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.src",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch"
},
"product_reference": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.src",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch"
},
"product_reference": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-08T10:52:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4214"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-08T10:52:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4214"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-08T10:52:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4214"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2020:5159
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for faq is now available for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nSecurity Fix(es):\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5159",
"url": "https://access.redhat.com/errata/RHSA-2020:5159"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5159.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.6 security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:33+00:00",
"generator": {
"date": "2025-11-06T23:52:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:5159",
"initial_release_date": "2020-11-30T15:06:10+00:00",
"revision_history": [
{
"date": "2020-11-30T15:06:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-13T06:09:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el8.s390x",
"product": {
"name": "faq-0:0.0.6-5.el8.s390x",
"product_id": "faq-0:0.0.6-5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el8.ppc64le",
"product": {
"name": "faq-0:0.0.6-5.el8.ppc64le",
"product_id": "faq-0:0.0.6-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el8.x86_64",
"product": {
"name": "faq-0:0.0.6-5.el8.x86_64",
"product_id": "faq-0:0.0.6-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el8.src",
"product": {
"name": "faq-0:0.0.6-5.el8.src",
"product_id": "faq-0:0.0.6-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.ppc64le"
},
"product_reference": "faq-0:0.0.6-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.s390x"
},
"product_reference": "faq-0:0.0.6-5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.src"
},
"product_reference": "faq-0:0.0.6-5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.x86_64"
},
"product_reference": "faq-0:0.0.6-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-30T15:06:10+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5159"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2020_4201
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 2.4.2 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Container-native Virtualization 2.4.2 Images (BZ#1877407)\n\nThis advisory contains the following OpenShift Virtualization 2.4.2 images:\n\nRHEL-7-CNV-2.4\n==============\nkubevirt-ssp-operator-container-v2.4.2-2\n\nRHEL-8-CNV-2.4\n==============\nvirt-cdi-controller-container-v2.4.2-1\nvirt-cdi-apiserver-container-v2.4.2-1\nhostpath-provisioner-operator-container-v2.4.2-1\nvirt-cdi-uploadproxy-container-v2.4.2-1\nvirt-cdi-cloner-container-v2.4.2-1\nvirt-cdi-importer-container-v2.4.2-1\nkubevirt-template-validator-container-v2.4.2-1\nhostpath-provisioner-container-v2.4.2-1\nvirt-cdi-uploadserver-container-v2.4.2-1\nvirt-cdi-operator-container-v2.4.2-1\nvirt-controller-container-v2.4.2-1\nkubevirt-cpu-model-nfd-plugin-container-v2.4.2-1\nvirt-api-container-v2.4.2-1\novs-cni-marker-container-v2.4.2-1\nkubevirt-cpu-node-labeller-container-v2.4.2-1\nbridge-marker-container-v2.4.2-1\nkubevirt-metrics-collector-container-v2.4.2-1\nkubemacpool-container-v2.4.2-1\ncluster-network-addons-operator-container-v2.4.2-1\novs-cni-plugin-container-v2.4.2-1\nkubernetes-nmstate-handler-container-v2.4.2-1\ncnv-containernetworking-plugins-container-v2.4.2-1\nvirtio-win-container-v2.4.2-1\nvirt-handler-container-v2.4.2-1\nvirt-launcher-container-v2.4.2-1\ncnv-must-gather-container-v2.4.2-1\nvirt-operator-container-v2.4.2-1\nvm-import-controller-container-v2.4.2-1\nhyperconverged-cluster-operator-container-v2.4.2-1\nvm-import-operator-container-v2.4.2-1\nkubevirt-vmware-container-v2.4.2-1\nkubevirt-v2v-conversion-container-v2.4.2-1\nkubevirt-kvm-info-nfd-plugin-container-v2.4.2-1\nnode-maintenance-operator-container-v2.4.2-1\nhco-bundle-registry-container-v2.4.2-15",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:4201",
"url": "https://access.redhat.com/errata/RHSA-2020:4201"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1869194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869194"
},
{
"category": "external",
"summary": "1869734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869734"
},
{
"category": "external",
"summary": "1875383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875383"
},
{
"category": "external",
"summary": "1877407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877407"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4201.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 2.4.2 Images",
"tracking": {
"current_release_date": "2024-11-13T22:15:12+00:00",
"generator": {
"date": "2024-11-13T22:15:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2020:4201",
"initial_release_date": "2020-10-06T23:52:47+00:00",
"revision_history": [
{
"date": "2020-10-06T23:52:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-06T23:52:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:15:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 2.4 for RHEL 8",
"product": {
"name": "CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:2.4::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-model-nfd-plugin\u0026tag=v2.4.2-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-node-labeller\u0026tag=v2.4.2-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"product_id": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-kvm-info-nfd-plugin\u0026tag=v2.4.2-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64",
"product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v2.4.2-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64 as a component of CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"relates_to_product_reference": "8Base-CNV-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64 as a component of CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"relates_to_product_reference": "8Base-CNV-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64 as a component of CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"relates_to_product_reference": "8Base-CNV-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64 as a component of CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64",
"relates_to_product_reference": "8Base-CNV-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-06T23:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4201"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-06T23:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4201"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2021:0956
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.6.23 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "ed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.6.23. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:0952\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster\n-between-minor.html#understanding-upgrade-channels_updating-cluster-between\n-minor.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0956",
"url": "https://access.redhat.com/errata/RHSA-2021:0956"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1941433",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941433"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0956.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.23 security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:59+00:00",
"generator": {
"date": "2025-11-06T23:52:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:0956",
"initial_release_date": "2021-03-30T16:48:30+00:00",
"revision_history": [
{
"date": "2021-03-30T16:48:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-03-30T16:48:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"product": {
"name": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"product_id": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"product": {
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"product_id": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"product": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"product": {
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"product_id": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202103210832.p0.git.94284.834ccc7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"product": {
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"product_id": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202103192141.p0.git.0.d1b612b.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-6.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-6.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202103200039.p0.git.3841.3e951a5.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-6.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-6.git7c289cc.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-6.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-6.git7c289cc.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product_id": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202103192141.p0.git.0.d1b612b.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product_id": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.6.0-202103192141.p0.git.0.d1b612b.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src"
},
"product_reference": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src"
},
"product_reference": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src"
},
"product_reference": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src"
},
"product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src"
},
"product_reference": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-30T16:48:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-30T16:48:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-30T16:48:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
}
]
}
rhsa-2021:1016
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.37 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.5.37. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1015\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster\n-between-minor.html#understanding-upgrade-channels_updating-cluster-between\n-minor\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1016",
"url": "https://access.redhat.com/errata/RHSA-2021:1016"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1944040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944040"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1016.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.37 security update",
"tracking": {
"current_release_date": "2025-11-06T23:53:02+00:00",
"generator": {
"date": "2025-11-06T23:53:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:1016",
"initial_release_date": "2021-04-13T23:35:52+00:00",
"revision_history": [
{
"date": "2021-04-13T23:35:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-13T23:35:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:53:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"product": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"product": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"product": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "podman-0:1.9.3-2.rhaos4.5.el8.src",
"product": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.src",
"product_id": "podman-0:1.9.3-2.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"product": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"product": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-5.git7c289cc.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"product": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"product": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-5.git7c289cc.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"product": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"product": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-5.git7c289cc.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"product": {
"name": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"product_id": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@1.9.3-2.rhaos4.5.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le"
},
"product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x"
},
"product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src"
},
"product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64"
},
"product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le"
},
"product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x"
},
"product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src"
},
"product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64"
},
"product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src"
},
"product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src"
},
"product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch"
},
"product_reference": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-13T23:35:52+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1016"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-13T23:35:52+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1016"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021_1366
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.7.9 is now available with\nupdates to packages and images that fix several bugs.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.7.9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.7.9. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHSA-2021:1365\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n-between-minor.html#understanding-upgrade-channels_updating-cluster-between\n-minor\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1366",
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "1918750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750"
},
{
"category": "external",
"summary": "1953464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953464"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1366.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.7.9 packages and security update",
"tracking": {
"current_release_date": "2024-11-22T16:38:01+00:00",
"generator": {
"date": "2024-11-22T16:38:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1366",
"initial_release_date": "2021-05-04T19:34:17+00:00",
"revision_history": [
{
"date": "2021-05-04T19:34:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-05-04T19:34:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:38:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.7",
"product": {
"name": "Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.7::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.7",
"product": {
"name": "Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.7::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"product": {
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"product_id": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.7.0-202104250659.p0.git.7d0a2b2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"product": {
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"product_id": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.7.0-202104250659.p0.git.e1b19c2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"product": {
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"product_id": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"product": {
"name": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"product_id": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.7.0-202104250659.p0.git.d49acc4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.7.0-202104250659.p0.git.95881af.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.7.0-202104250659.p0.git.95881af.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product_id": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.7.0-202104250659.p0.git.e1b19c2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product_id": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.7.0-202104250659.p0.git.e1b19c2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src"
},
"product_reference": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src"
},
"product_reference": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src"
},
"product_reference": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src"
},
"product_reference": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-04T19:34:17+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-04T19:34:17+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-04T19:34:17+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
},
{
"cve": "CVE-2021-3114",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-01-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1918750"
}
],
"notes": [
{
"category": "description",
"text": "A flaw detected in golang: crypto/elliptic, in which P-224 keys as generated can return incorrect inputs, reducing the strength of the cryptography. The highest threat from this vulnerability is confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/elliptic: incorrect operations on the P-224 curve",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3114"
},
{
"category": "external",
"summary": "RHBZ#1918750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/mperVMGa98w",
"url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w"
}
],
"release_date": "2021-01-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-04T19:34:17+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/elliptic: incorrect operations on the P-224 curve"
}
]
}
rhsa-2020:5119
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.20 is now available with updates to packages and images that fix several bugs.\n\nThis release also includes a security update for golang for Red Hat OpenShift Container Platform 4.5.20.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nSecurity Fix(es):\n\n* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.5.20. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2020:5118\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.[y]/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5119",
"url": "https://access.redhat.com/errata/RHSA-2020:5119"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1897972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897972"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5119.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.20 packages and golang security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:32+00:00",
"generator": {
"date": "2025-11-06T23:52:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:5119",
"initial_release_date": "2020-11-24T11:57:51+00:00",
"revision_history": [
{
"date": "2020-11-24T11:57:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-11-24T11:57:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.ppc64le",
"product": {
"name": "faq-0:0.0.6-5.el7.ppc64le",
"product_id": "faq-0:0.0.6-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-4.rhaos4.5.git6dee389.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.s390x",
"product": {
"name": "faq-0:0.0.6-5.el7.s390x",
"product_id": "faq-0:0.0.6-5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_id": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-4.rhaos4.5.git6dee389.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.x86_64",
"product": {
"name": "faq-0:0.0.6-5.el7.x86_64",
"product_id": "faq-0:0.0.6-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-4.rhaos4.5.git6dee389.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.src",
"product": {
"name": "faq-0:0.0.6-5.el7.src",
"product_id": "faq-0:0.0.6-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"product": {
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"product_id": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"product": {
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"product_id": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202011121956.p0.git.0.7093c82.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"product": {
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"product_id": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product_id": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202011121956.p0.git.0.7093c82.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product_id": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.5.0-202011121956.p0.git.0.7093c82.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le"
},
"product_reference": "faq-0:0.0.6-5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x"
},
"product_reference": "faq-0:0.0.6-5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src"
},
"product_reference": "faq-0:0.0.6-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64"
},
"product_reference": "faq-0:0.0.6-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src"
},
"product_reference": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src"
},
"product_reference": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src"
},
"product_reference": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-24T11:57:51+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-24T11:57:51+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2020:5118
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.20 is now available with updates to packages and images that fix several bugs.\n\nThis release includes a security update for golang for Red Hat OpenShift Container Platform 4.5.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.5.20. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2020:5119\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nThis update fixes the following bug among others:\n\n* Previously, the Prometheus swagger definition contained a `$ref` property which could not be resolved. This caused a runtime error to occur when using the Prometheus operand creation form. This was fixed by adding a `definitions` property to schema returned by the `definitionFor` helper function so that the `$ref` property can resolve. There are no longer runtime errors when using the Prometheus operand creation form. (BZ#1885228)\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.5.20-x86_64\n\nThe image digest is sha256:78b878986d2d0af6037d637aa63e7b6f80fc8f17d0f0d5b077ac6aca83f792a0\n\n(For s390x architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.5.20-s390x\n\nThe image digest is sha256:372d9aea634d36704d8500a2f940edb3867bfde14c0e5aa19534ea5ac90083d4\n\n(For ppc64le architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.5.20-ppc64le\n\nThe image digest is sha256:030d8323cce90de6bc7ad4119ebb7f000bde06e742f6923faf76707ffe85634a\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5118",
"url": "https://access.redhat.com/errata/RHSA-2020:5118"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1883268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883268"
},
{
"category": "external",
"summary": "1885228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885228"
},
{
"category": "external",
"summary": "1892585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892585"
},
{
"category": "external",
"summary": "1893202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893202"
},
{
"category": "external",
"summary": "1893742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893742"
},
{
"category": "external",
"summary": "1894763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894763"
},
{
"category": "external",
"summary": "1894782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894782"
},
{
"category": "external",
"summary": "1895057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895057"
},
{
"category": "external",
"summary": "1896990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896990"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5118.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.20 bug fix and golang security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:32+00:00",
"generator": {
"date": "2025-11-06T23:52:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:5118",
"initial_release_date": "2020-11-24T12:41:33+00:00",
"revision_history": [
{
"date": "2020-11-24T12:41:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-11-24T12:41:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"product_id": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"product_id": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"product_id": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"product": {
"name": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"product_id": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"product_id": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"product": {
"name": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"product_id": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"product": {
"name": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"product_id": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"product": {
"name": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"product_id": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.5.0-202011070210.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"product": {
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"product_id": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-ipa-downloader-rhel8\u0026tag=v4.5.0-202011070210.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"product_id": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"product_id": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le",
"product": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le",
"product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"product": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"product_id": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"product_id": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"product": {
"name": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"product_id": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"product": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"product_id": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"product": {
"name": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"product_id": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"product": {
"name": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"product_id": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"product": {
"name": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"product_id": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"product": {
"name": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"product_id": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"product": {
"name": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"product_id": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"product_id": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"product": {
"name": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"product_id": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"product": {
"name": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"product_id": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"product": {
"name": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"product_id": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"product": {
"name": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"product_id": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"product": {
"name": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"product_id": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"product": {
"name": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"product_id": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"product": {
"name": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"product_id": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"product_id": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"product_id": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"product": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"product": {
"name": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"product_id": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"product": {
"name": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"product_id": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"product_id": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"product": {
"name": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"product_id": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"product_id": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"product_id": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"product_id": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"product": {
"name": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"product_id": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"product_id": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"product_id": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"product_id": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"product": {
"name": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"product_id": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.5.0-202011132127.p0"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"product_id": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"product_id": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"product_id": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"product": {
"name": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"product_id": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"product_id": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"product": {
"name": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"product_id": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"product": {
"name": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"product_id": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"product": {
"name": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"product_id": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.5.0-202011070210.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"product": {
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"product_id": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-ipa-downloader-rhel8\u0026tag=v4.5.0-202011070210.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"product_id": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"product_id": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"product": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"product": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"product_id": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"product_id": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"product": {
"name": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"product_id": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"product": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"product_id": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"product": {
"name": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"product_id": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"product": {
"name": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"product_id": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"product": {
"name": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"product_id": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"product": {
"name": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"product_id": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"product": {
"name": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"product_id": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"product_id": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"product": {
"name": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"product_id": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"product": {
"name": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"product_id": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"product": {
"name": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"product_id": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"product": {
"name": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"product_id": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"product": {
"name": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"product_id": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"product": {
"name": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"product_id": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"product": {
"name": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"product_id": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"product": {
"name": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"product_id": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"product": {
"name": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"product_id": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"product_id": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"product_id": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"product": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"product": {
"name": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"product_id": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"product": {
"name": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"product_id": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"product_id": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"product": {
"name": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"product_id": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"product_id": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"product_id": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"product_id": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"product": {
"name": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"product_id": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"product_id": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"product_id": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"product_id": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"product": {
"name": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"product_id": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.5.0-202011132127.p0"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"product_id": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"product_id": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"product_id": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"product": {
"name": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"product_id": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"product_id": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"product": {
"name": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"product_id": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"product": {
"name": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"product_id": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"product_id": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"product_id": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"product": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"product_id": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"product_id": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"product": {
"name": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"product_id": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"product": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"product_id": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"product": {
"name": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"product_id": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"product": {
"name": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"product_id": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"product": {
"name": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"product_id": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"product": {
"name": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"product_id": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"product": {
"name": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"product_id": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"product_id": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"product": {
"name": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"product_id": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"product": {
"name": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"product_id": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"product": {
"name": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"product_id": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"product": {
"name": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"product_id": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"product": {
"name": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"product_id": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"product": {
"name": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"product_id": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"product_id": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"product_id": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"product": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"product": {
"name": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"product_id": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"product": {
"name": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"product_id": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"product_id": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"product": {
"name": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"product_id": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"product_id": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"product_id": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"product_id": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"product": {
"name": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"product_id": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"product_id": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"product_id": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"product_id": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"product": {
"name": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"product_id": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.5.0-202011132127.p0"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64"
},
"product_reference": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64"
},
"product_reference": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x"
},
"product_reference": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le"
},
"product_reference": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64"
},
"product_reference": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le"
},
"product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x"
},
"product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64"
},
"product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64"
},
"product_reference": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le"
},
"product_reference": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x"
},
"product_reference": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x"
},
"product_reference": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64"
},
"product_reference": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le"
},
"product_reference": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64"
},
"product_reference": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x"
},
"product_reference": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le"
},
"product_reference": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le"
},
"product_reference": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x"
},
"product_reference": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64"
},
"product_reference": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64"
},
"product_reference": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x"
},
"product_reference": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le"
},
"product_reference": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x"
},
"product_reference": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le"
},
"product_reference": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64"
},
"product_reference": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le"
},
"product_reference": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64"
},
"product_reference": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x"
},
"product_reference": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x"
},
"product_reference": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64"
},
"product_reference": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le"
},
"product_reference": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le"
},
"product_reference": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x"
},
"product_reference": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64"
},
"product_reference": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x"
},
"product_reference": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64"
},
"product_reference": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le"
},
"product_reference": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le"
},
"product_reference": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x"
},
"product_reference": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64"
},
"product_reference": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x"
},
"product_reference": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64"
},
"product_reference": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le"
},
"product_reference": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le"
},
"product_reference": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64"
},
"product_reference": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64"
},
"product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le"
},
"product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x"
},
"product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64"
},
"product_reference": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x"
},
"product_reference": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le"
},
"product_reference": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64"
},
"product_reference": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le"
},
"product_reference": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x"
},
"product_reference": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x"
},
"product_reference": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64"
},
"product_reference": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le"
},
"product_reference": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64"
},
"product_reference": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x"
},
"product_reference": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le"
},
"product_reference": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le"
},
"product_reference": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x"
},
"product_reference": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64"
},
"product_reference": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64"
},
"product_reference": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x"
},
"product_reference": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le"
},
"product_reference": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le"
},
"product_reference": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64"
},
"product_reference": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x"
},
"product_reference": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le"
},
"product_reference": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x"
},
"product_reference": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64"
},
"product_reference": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64"
},
"product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le"
},
"product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le"
},
"product_reference": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64"
},
"product_reference": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64"
},
"product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
},
"product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-24T12:41:33+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5118"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-24T12:41:33+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5118"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHBA-2021:0101
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Jaeger 1.20.2.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Jaeger provides these changes:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2021:0101",
"url": "https://access.redhat.com/errata/RHBA-2021:0101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_0101.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Jaeger 1.20.2 Operator/Operand Containers",
"tracking": {
"current_release_date": "2025-11-06T23:51:28+00:00",
"generator": {
"date": "2025-11-06T23:51:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHBA-2021:0101",
"initial_release_date": "2021-01-13T15:41:50+00:00",
"revision_history": [
{
"date": "2021-01-13T15:41:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-13T15:41:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:51:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Jaeger 1.20",
"product": {
"name": "Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jaeger:1.20::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Jaeger"
},
{
"branches": [
{
"category": "product_version",
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"product": {
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"product": {
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"product": {
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.20.2-3"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"product": {
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"product": {
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.20.2-3"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"product": {
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"product": {
"name": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"product_id": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64",
"product": {
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64",
"product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.20.2-2"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64"
},
"product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64"
},
"product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64"
},
"product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64"
},
"product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64"
},
"product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64"
},
"product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64"
},
"product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
},
"product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-13T15:41:50+00:00",
"details": "Red Hat OpenShift Jaeger Release",
"product_ids": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0101"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-13T15:41:50+00:00",
"details": "Red Hat OpenShift Jaeger Release",
"product_ids": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0101"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021:4103
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.9.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform. \n\nThis advisory contains OpenShift Virtualization 4.9.0 RPMs.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4103",
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1918750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750"
},
{
"category": "external",
"summary": "1958341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341"
},
{
"category": "external",
"summary": "1981345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981345"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4103.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.9.0 RPMs security and bug fix update",
"tracking": {
"current_release_date": "2025-11-07T16:39:26+00:00",
"generator": {
"date": "2025-11-07T16:39:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:4103",
"initial_release_date": "2021-11-02T17:36:11+00:00",
"revision_history": [
{
"date": "2021-11-02T17:36:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-02T17:36:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T16:39:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.9 for RHEL 7",
"product": {
"name": "CNV 4.9 for RHEL 7",
"product_id": "7Server-CNV-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.9::el7"
}
}
},
{
"category": "product_name",
"name": "CNV 4.9 for RHEL 8",
"product": {
"name": "CNV 4.9 for RHEL 8",
"product_id": "8Base-CNV-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.9::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-0:4.9.0-287.el7.src",
"product": {
"name": "kubevirt-0:4.9.0-287.el7.src",
"product_id": "kubevirt-0:4.9.0-287.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.9.0-287.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kubevirt-0:4.9.0-287.el8.src",
"product": {
"name": "kubevirt-0:4.9.0-287.el8.src",
"product_id": "kubevirt-0:4.9.0-287.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.9.0-287.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"product_id": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.9.0-287.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.9.0-287.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"product_id": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.9.0-287.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.9.0-287.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.9.0-287.el7.src as a component of CNV 4.9 for RHEL 7",
"product_id": "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src"
},
"product_reference": "kubevirt-0:4.9.0-287.el7.src",
"relates_to_product_reference": "7Server-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64 as a component of CNV 4.9 for RHEL 7",
"product_id": "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64 as a component of CNV 4.9 for RHEL 7",
"product_id": "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.9.0-287.el8.src as a component of CNV 4.9 for RHEL 8",
"product_id": "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src"
},
"product_reference": "kubevirt-0:4.9.0-287.el8.src",
"relates_to_product_reference": "8Base-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64 as a component of CNV 4.9 for RHEL 8",
"product_id": "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64 as a component of CNV 4.9 for RHEL 8",
"product_id": "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-02T17:36:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-02T17:36:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2021-3114",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1918750"
}
],
"notes": [
{
"category": "description",
"text": "A flaw detected in golang: crypto/elliptic, in which P-224 keys as generated can return incorrect inputs, reducing the strength of the cryptography. The highest threat from this vulnerability is confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/elliptic: incorrect operations on the P-224 curve",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3114"
},
{
"category": "external",
"summary": "RHBZ#1918750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/mperVMGa98w",
"url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w"
}
],
"release_date": "2021-01-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-02T17:36:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/elliptic: incorrect operations on the P-224 curve"
},
{
"cve": "CVE-2021-31525",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1958341"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31525"
},
{
"category": "external",
"summary": "RHBZ#1958341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc",
"url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc"
}
],
"release_date": "2021-04-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-02T17:36:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header"
}
]
}
rhsa-2020_5606
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for mcg is now available for Red Hat OpenShift Container Storage 4.6.0 on RHEL-8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nThese updated packages include numerous security fixes, bug fixes, and\nenhancements.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThese updated packages include numerous bug fixes and enhancements. Users are\ndirected to the Red Hat OpenShift Container Storage Release Notes for\ninformation on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.6/html/4.6_release_notes/index\n\nAll Red Hat OpenShift Container Storage users are advised to upgrade to these\nupdated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5606",
"url": "https://access.redhat.com/errata/RHSA-2020:5606"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5606.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6 bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-01-06T18:49:13+00:00",
"generator": {
"date": "2025-01-06T18:49:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2020:5606",
"initial_release_date": "2020-12-17T05:43:57+00:00",
"revision_history": [
{
"date": "2020-12-17T05:43:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-17T05:43:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T18:49:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product": {
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_container_storage:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Container Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "tini-0:0.18.0-5.el8.src",
"product": {
"name": "tini-0:0.18.0-5.el8.src",
"product_id": "tini-0:0.18.0-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"product": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tini-0:0.18.0-5.el8.x86_64",
"product": {
"name": "tini-0:0.18.0-5.el8.x86_64",
"product_id": "tini-0:0.18.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"product": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tini-0:0.18.0-5.el8.s390x",
"product": {
"name": "tini-0:0.18.0-5.el8.s390x",
"product_id": "tini-0:0.18.0-5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"product": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tini-0:0.18.0-5.el8.ppc64le",
"product": {
"name": "tini-0:0.18.0-5.el8.ppc64le",
"product_id": "tini-0:0.18.0-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"product": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le"
},
"product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x"
},
"product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src"
},
"product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
},
"product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.18.0-5.el8.ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le"
},
"product_reference": "tini-0:0.18.0-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.18.0-5.el8.s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x"
},
"product_reference": "tini-0:0.18.0-5.el8.s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.18.0-5.el8.src as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src"
},
"product_reference": "tini-0:0.18.0-5.el8.src",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.18.0-5.el8.x86_64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
},
"product_reference": "tini-0:0.18.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T05:43:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5606"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T05:43:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5606"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T05:43:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5606"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2021:2122
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.7.13 is now available with updates to packages and images that fix several bugs.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.13. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2021:2121\n\nSecurity Fix(es):\n\n* jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks. (CVE-2021-21642)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints. (CVE-2021-21643)\n\n* jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. (CVE-2021-21644)\n\n* jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints. (CVE-2021-21645)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2122",
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1952146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952146"
},
{
"category": "external",
"summary": "1952148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952148"
},
{
"category": "external",
"summary": "1952151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952151"
},
{
"category": "external",
"summary": "1952152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952152"
},
{
"category": "external",
"summary": "1964770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964770"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2122.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.7.13 packages and security update",
"tracking": {
"current_release_date": "2025-11-06T23:53:13+00:00",
"generator": {
"date": "2025-11-06T23:53:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:2122",
"initial_release_date": "2021-06-01T04:12:55+00:00",
"revision_history": [
{
"date": "2021-06-01T04:12:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-06-01T04:12:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:53:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.7",
"product": {
"name": "Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.7::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.7",
"product": {
"name": "Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.7::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:47.83-2.el8.src",
"product": {
"name": "redhat-release-coreos-0:47.83-2.el8.src",
"product_id": "redhat-release-coreos-0:47.83-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.7.1621361158-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.20.0-3.el7.src",
"product": {
"name": "cri-tools-0:1.20.0-3.el7.src",
"product_id": "cri-tools-0:1.20.0-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.20.0-3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:47.83-2.el8.x86_64",
"product": {
"name": "redhat-release-coreos-0:47.83-2.el8.x86_64",
"product_id": "redhat-release-coreos-0:47.83-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.20.0-3.el7.x86_64",
"product": {
"name": "cri-tools-0:1.20.0-3.el7.x86_64",
"product_id": "cri-tools-0:1.20.0-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.20.0-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"product_id": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.20.0-3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:47.83-2.el8.ppc64le",
"product": {
"name": "redhat-release-coreos-0:47.83-2.el8.ppc64le",
"product_id": "redhat-release-coreos-0:47.83-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_id": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:47.83-2.el8.s390x",
"product": {
"name": "redhat-release-coreos-0:47.83-2.el8.s390x",
"product_id": "redhat-release-coreos-0:47.83-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.7.1621361158-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.20.0-3.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src"
},
"product_reference": "cri-tools-0:1.20.0-3.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.20.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64"
},
"product_reference": "cri-tools-0:1.20.0-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:47.83-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le"
},
"product_reference": "redhat-release-coreos-0:47.83-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:47.83-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x"
},
"product_reference": "redhat-release-coreos-0:47.83-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:47.83-2.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src"
},
"product_reference": "redhat-release-coreos-0:47.83-2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:47.83-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
},
"product_reference": "redhat-release-coreos-0:47.83-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2021-21642",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2021-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1952146"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the config-file-provider Jenkins plugin. The plugin XML parser wasn\u0027t configure to prevent XML external entity (XXE) attacks. An attacker with the ability to define Maven configuration files can use this vulnerability to prepare a crafted configuration file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21642"
},
{
"category": "external",
"summary": "RHBZ#1952146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21642"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21642",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21642"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2204",
"url": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2204"
}
],
"release_date": "2021-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks."
},
{
"cve": "CVE-2021-21643",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2021-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1952148"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the config-file-provider Jenkins plugin. The plugin does not correctly perform permission checks in several HTTP endpoints, as a consequence an attacker with global Job/Configure permission can enumerate system-scoped credentials IDs of credentials stored in Jenkins.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21643"
},
{
"category": "external",
"summary": "RHBZ#1952148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21643"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21643",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21643"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2254",
"url": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2254"
}
],
"release_date": "2021-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints."
},
{
"cve": "CVE-2021-21644",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"discovery_date": "2021-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1952151"
}
],
"notes": [
{
"category": "description",
"text": "A cross-site request forgery (CSRF) vulnerability was found in the config-file-provider Jenkins plugin. The plugin does not require POST requests for an HTTP endpoint which allows attackers to delete configuration files corresponding to an attacker-specified ID.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21644"
},
{
"category": "external",
"summary": "RHBZ#1952151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21644"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21644",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21644"
}
],
"release_date": "2021-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability."
},
{
"cve": "CVE-2021-21645",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2021-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1952152"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the config-file-provider Jenkins plugin. The plugin does not perform permission checks in several HTTP endpoints, as a consequence an attacker with Overall/Read permission is allowed to enumerate configuration file IDs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21645"
},
{
"category": "external",
"summary": "RHBZ#1952152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952152"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21645"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21645",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21645"
}
],
"release_date": "2021-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints."
}
]
}
RHSA-2020:5605
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated images are now available for Red Hat OpenShift Container Storage 4.6.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nThese updated images include numerous security fixes, bug fixes, and enhancements. \n\nSecurity Fix(es):\n\n* nodejs-node-forge: prototype pollution via the util.setPath function (CVE-2020-7720)\n\n* nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS (CVE-2020-8237)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nUsers are directed to the Red Hat OpenShift Container Storage Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.6/html/4.6_release_notes/index\n\nAll Red Hat OpenShift Container Storage users are advised to upgrade to\nthese updated images.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5605",
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1806266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806266"
},
{
"category": "external",
"summary": "1813506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813506"
},
{
"category": "external",
"summary": "1817438",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817438"
},
{
"category": "external",
"summary": "1817850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817850"
},
{
"category": "external",
"summary": "1827157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827157"
},
{
"category": "external",
"summary": "1829055",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1829055"
},
{
"category": "external",
"summary": "1833153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833153"
},
{
"category": "external",
"summary": "1836299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836299"
},
{
"category": "external",
"summary": "1842254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842254"
},
{
"category": "external",
"summary": "1845976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845976"
},
{
"category": "external",
"summary": "1849771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849771"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1854500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854500"
},
{
"category": "external",
"summary": "1854501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854501"
},
{
"category": "external",
"summary": "1854503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854503"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1858195",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858195"
},
{
"category": "external",
"summary": "1859183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859183"
},
{
"category": "external",
"summary": "1859229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859229"
},
{
"category": "external",
"summary": "1859478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859478"
},
{
"category": "external",
"summary": "1860022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860022"
},
{
"category": "external",
"summary": "1860034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860034"
},
{
"category": "external",
"summary": "1860670",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860670"
},
{
"category": "external",
"summary": "1860848",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860848"
},
{
"category": "external",
"summary": "1861780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861780"
},
{
"category": "external",
"summary": "1865938",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865938"
},
{
"category": "external",
"summary": "1867024",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867024"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1868060",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868060"
},
{
"category": "external",
"summary": "1868703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868703"
},
{
"category": "external",
"summary": "1869411",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869411"
},
{
"category": "external",
"summary": "1870061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870061"
},
{
"category": "external",
"summary": "1870338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870338"
},
{
"category": "external",
"summary": "1870631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870631"
},
{
"category": "external",
"summary": "1872119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872119"
},
{
"category": "external",
"summary": "1872696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872696"
},
{
"category": "external",
"summary": "1873864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873864"
},
{
"category": "external",
"summary": "1874606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874606"
},
{
"category": "external",
"summary": "1875476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875476"
},
{
"category": "external",
"summary": "1877339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877339"
},
{
"category": "external",
"summary": "1877371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877371"
},
{
"category": "external",
"summary": "1878153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878153"
},
{
"category": "external",
"summary": "1878714",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878714"
},
{
"category": "external",
"summary": "1878853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878853"
},
{
"category": "external",
"summary": "1879008",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879008"
},
{
"category": "external",
"summary": "1879072",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879072"
},
{
"category": "external",
"summary": "1879919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879919"
},
{
"category": "external",
"summary": "1880255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880255"
},
{
"category": "external",
"summary": "1881028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881028"
},
{
"category": "external",
"summary": "1881071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881071"
},
{
"category": "external",
"summary": "1882397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882397"
},
{
"category": "external",
"summary": "1883253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883253"
},
{
"category": "external",
"summary": "1883398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883398"
},
{
"category": "external",
"summary": "1883767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883767"
},
{
"category": "external",
"summary": "1883810",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883810"
},
{
"category": "external",
"summary": "1883927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883927"
},
{
"category": "external",
"summary": "1885175",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885175"
},
{
"category": "external",
"summary": "1885428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885428"
},
{
"category": "external",
"summary": "1885648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885648"
},
{
"category": "external",
"summary": "1885971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885971"
},
{
"category": "external",
"summary": "1886308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886308"
},
{
"category": "external",
"summary": "1886348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886348"
},
{
"category": "external",
"summary": "1886551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886551"
},
{
"category": "external",
"summary": "1886709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886709"
},
{
"category": "external",
"summary": "1886859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886859"
},
{
"category": "external",
"summary": "1886873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886873"
},
{
"category": "external",
"summary": "1888583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888583"
},
{
"category": "external",
"summary": "1888593",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888593"
},
{
"category": "external",
"summary": "1888614",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888614"
},
{
"category": "external",
"summary": "1889441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889441"
},
{
"category": "external",
"summary": "1889683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889683"
},
{
"category": "external",
"summary": "1889866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889866"
},
{
"category": "external",
"summary": "1890183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890183"
},
{
"category": "external",
"summary": "1890638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890638"
},
{
"category": "external",
"summary": "1890971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890971"
},
{
"category": "external",
"summary": "1891856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891856"
},
{
"category": "external",
"summary": "1892206",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892206"
},
{
"category": "external",
"summary": "1892234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892234"
},
{
"category": "external",
"summary": "1893624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893624"
},
{
"category": "external",
"summary": "1893691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893691"
},
{
"category": "external",
"summary": "1893714",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893714"
},
{
"category": "external",
"summary": "1895402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895402"
},
{
"category": "external",
"summary": "1896298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896298"
},
{
"category": "external",
"summary": "1896831",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896831"
},
{
"category": "external",
"summary": "1898521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898521"
},
{
"category": "external",
"summary": "1902627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902627"
},
{
"category": "external",
"summary": "1904171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904171"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5605.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6.0 security, bug fix, enhancement update",
"tracking": {
"current_release_date": "2025-11-07T15:51:57+00:00",
"generator": {
"date": "2025-11-07T15:51:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:5605",
"initial_release_date": "2020-12-17T19:42:16+00:00",
"revision_history": [
{
"date": "2020-12-17T19:42:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-17T19:42:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T15:51:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product": {
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_container_storage:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Container Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"product_id": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"product_id": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"product_id": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"product_id": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"product_id": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"product_id": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"product_id": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"product_id": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"product_id": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"product_id": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"product_id": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"product_id": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"product_id": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"product_id": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"product_id": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7720",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-09-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1874606"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-node-forge. A Prototype Pollution via the util.setPath function is possible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-node-forge: prototype pollution via the util.setPath function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat Openshift Container Storage 4 the noobaa-core container includes the affected version of node-forge as a dependency of google-p12-pem, however the vulnerable function `util.setPath` is not being used and hence this issue has been rated as having a security impact of Low.\n\nIn OpenShift Container Platform (OCP) the prometheus container is behind OpenShift OAuth restricting access to the vulnerable node-forge library to authenticated users only, therefore the impact is Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-7720"
},
{
"category": "external",
"summary": "RHBZ#1874606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-7720",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7720"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677",
"url": "https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677"
}
],
"release_date": "2020-09-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-node-forge: prototype pollution via the util.setPath function"
},
{
"cve": "CVE-2020-8237",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-09-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1881028"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-json-bigint. A Prototype pollution in json-bigint npm may lead to a denial-of-service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat Openshift Container Storage 4 the noobaa-core container includes the affected version of json-bigint as a dependency of googleapis, however the json-bigint library is not being used and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8237"
},
{
"category": "external",
"summary": "RHBZ#1881028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8237",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8237"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8237",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8237"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/916430",
"url": "https://hackerone.com/reports/916430"
}
],
"release_date": "2020-08-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS"
},
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2020:5159
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for faq is now available for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nSecurity Fix(es):\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5159",
"url": "https://access.redhat.com/errata/RHSA-2020:5159"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5159.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.6 security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:33+00:00",
"generator": {
"date": "2025-11-06T23:52:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:5159",
"initial_release_date": "2020-11-30T15:06:10+00:00",
"revision_history": [
{
"date": "2020-11-30T15:06:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-13T06:09:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el8.s390x",
"product": {
"name": "faq-0:0.0.6-5.el8.s390x",
"product_id": "faq-0:0.0.6-5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el8.ppc64le",
"product": {
"name": "faq-0:0.0.6-5.el8.ppc64le",
"product_id": "faq-0:0.0.6-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el8.x86_64",
"product": {
"name": "faq-0:0.0.6-5.el8.x86_64",
"product_id": "faq-0:0.0.6-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el8.src",
"product": {
"name": "faq-0:0.0.6-5.el8.src",
"product_id": "faq-0:0.0.6-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.ppc64le"
},
"product_reference": "faq-0:0.0.6-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.s390x"
},
"product_reference": "faq-0:0.0.6-5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.src"
},
"product_reference": "faq-0:0.0.6-5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.x86_64"
},
"product_reference": "faq-0:0.0.6-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-30T15:06:10+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5159"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhba-2020:4197
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.6.1 is now available with\nupdates to packages and images that fix several bugs and add enhancements.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat\nOpenShift Container Platform 4.6.1. See the following advisory for the\ncontainer images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2020:4196\n\nSpace precludes documenting all of the bug fixes and enhancements in this\nadvisory, as well as all of the container images in this advisory. See the\nfollowing Release Notes documentation, which will be updated shortly for\nthis release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:4197",
"url": "https://access.redhat.com/errata/RHBA-2020:4197"
},
{
"category": "external",
"summary": "1834410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834410"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_4197.json"
}
],
"title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6 GA RPMs",
"tracking": {
"current_release_date": "2025-11-06T23:51:27+00:00",
"generator": {
"date": "2025-11-06T23:51:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHBA-2020:4197",
"initial_release_date": "2020-10-27T14:47:06+00:00",
"revision_history": [
{
"date": "2020-10-27T14:47:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-27T14:47:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:51:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"product": {
"name": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"product_id": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl100-firmware@39.31.5.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"product": {
"name": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"product_id": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl1000-firmware@39.31.5.1-98.el8.1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl105-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl135-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl2000-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl2030-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"product": {
"name": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"product_id": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl3160-firmware@25.30.13.0-98.el8.1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"product": {
"name": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"product_id": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl3945-firmware@15.32.2.9-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"product": {
"name": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"product_id": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl4965-firmware@228.61.2.24-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"product": {
"name": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"product_id": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl5000-firmware@8.83.5.1_1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"product": {
"name": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"product_id": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl5150-firmware@8.24.2.2-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"product": {
"name": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"product_id": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6000-firmware@9.221.4.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6000g2a-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6000g2b-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"product": {
"name": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"product_id": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6050-firmware@41.28.5.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"product": {
"name": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"product_id": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl7260-firmware@25.30.13.0-98.el8.1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libertas-sd8686-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libertas-sd8787-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libertas-usb8388-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libertas-usb8388-olpc-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/linux-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pprof-0:2.6.3-2.el8+7.noarch",
"product": {
"name": "pprof-0:2.6.3-2.el8+7.noarch",
"product_id": "pprof-0:2.6.3-2.el8+7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pprof@2.6.3-2.el8%2B7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product": {
"name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_id": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kuryr-binding-scripts@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product": {
"name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_id": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-lib@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product": {
"name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_id": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-lib-tests@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"product": {
"name": "python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"product_id": "python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-pyroute2@0.5.3-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "protobuf-vim-0:3.6.1-4.el8ost.noarch",
"product": {
"name": "protobuf-vim-0:3.6.1-4.el8ost.noarch",
"product_id": "protobuf-vim-0:3.6.1-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-vim@3.6.1-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-protobuf-0:3.6.1-4.el8ost.noarch",
"product": {
"name": "python3-protobuf-0:3.6.1-4.el8ost.noarch",
"product_id": "python3-protobuf-0:3.6.1-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-protobuf@3.6.1-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"product": {
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"product_id": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhcos-tools@0.0.0-1.rhaos4.2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"product": {
"name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"product_id": "ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-http@1.0.0-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"product": {
"name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"product_id": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-requests-unixsocket@0.1.5-5.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"product": {
"name": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"product_id": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ironic-lib@4.3.0-0.20200605221931.df238ba.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product": {
"name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product_id": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openstacksdk@0.48.0-0.20200708092906.3b693c2.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product": {
"name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product_id": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openstacksdk-tests@0.48.0-0.20200708092906.3b693c2.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"product": {
"name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"product_id": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keystoneauth1@4.2.0-0.20200630234358.dab8e10.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"product": {
"name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"product_id": "python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-zeroconf@0.24.4-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"product": {
"name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"product_id": "python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ifaddr@0.1.6-5.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-construct-0:2.10.56-1.el8ost.noarch",
"product": {
"name": "python3-construct-0:2.10.56-1.el8ost.noarch",
"product_id": "python3-construct-0:2.10.56-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-construct@2.10.56-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kubernetes-0:11.0.0-1.el8.noarch",
"product": {
"name": "python3-kubernetes-0:11.0.0-1.el8.noarch",
"product_id": "python3-kubernetes-0:11.0.0-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kubernetes@11.0.0-1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"product": {
"name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"product_id": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kubernetes-tests@11.0.0-1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-openshift-1:0.11.2-1.el8.noarch",
"product": {
"name": "python3-openshift-1:0.11.2-1.el8.noarch",
"product_id": "python3-openshift-1:0.11.2-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openshift@0.11.2-1.el8?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_id": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/octavia-amphora-image-x86_64@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-all@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-ipa@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-ipa-ppc64le@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-ipa-x86_64@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-minimal@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-ppc64le@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-x86_64@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"product": {
"name": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"product_id": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-config-connectivity-redhat@1.22.8-6.el8_2?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"product": {
"name": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"product_id": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-config-server@1.22.8-6.el8_2?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"product": {
"name": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"product_id": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-dispatcher-routing-rules@1.22.8-6.el8_2?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-pexpect-0:4.6-2.el8ar.noarch",
"product": {
"name": "python3-pexpect-0:4.6-2.el8ar.noarch",
"product_id": "python3-pexpect-0:4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-pexpect@4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-lockfile-1:0.11.0-8.el8ar.noarch",
"product": {
"name": "python3-lockfile-1:0.11.0-8.el8ar.noarch",
"product_id": "python3-lockfile-1:0.11.0-8.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lockfile@0.11.0-8.el8ar?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-daemon-0:2.1.2-9.el8ar.noarch",
"product": {
"name": "python3-daemon-0:2.1.2-9.el8ar.noarch",
"product_id": "python3-daemon-0:2.1.2-9.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-daemon@2.1.2-9.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"product": {
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"product_id": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.8-1.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"product": {
"name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"product_id": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tooz@2.7.0-0.20200723133754.fca43df.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-rsa-0:4.6-1.el8.noarch",
"product": {
"name": "python3-rsa-0:4.6-1.el8.noarch",
"product_id": "python3-rsa-0:4.6-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rsa@4.6-1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product": {
"name": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_id": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-oslo-concurrency-lang@4.2.0-0.20200708091908.35e4df4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product": {
"name": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_id": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-oslo-concurrency@4.2.0-0.20200708091908.35e4df4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product": {
"name": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_id": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-oslo-concurrency-tests@4.2.0-0.20200708091908.35e4df4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector-api@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector-conductor@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector-dnsmasq@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ironic-inspector-tests@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-flask-doc-1:1.1.1-1.el8ost.noarch",
"product": {
"name": "python-flask-doc-1:1.1.1-1.el8ost.noarch",
"product_id": "python-flask-doc-1:1.1.1-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-flask-doc@1.1.1-1.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-flask-1:1.1.1-1.el8ost.noarch",
"product": {
"name": "python3-flask-1:1.1.1-1.el8ost.noarch",
"product_id": "python3-flask-1:1.1.1-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-flask@1.1.1-1.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"product": {
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"product_id": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.144.0-1.rhaos4.6.el8?arch=noarch\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python3-pbr-0:5.4.3-2.el8ost.noarch",
"product": {
"name": "python3-pbr-0:5.4.3-2.el8ost.noarch",
"product_id": "python3-pbr-0:5.4.3-2.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-pbr@5.4.3-2.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product": {
"name": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product_id": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-sushy@3.3.0-0.20200804091926.0dfe74a.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product": {
"name": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product_id": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-sushy-tests@3.3.0-0.20200804091926.0dfe74a.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"product": {
"name": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"product_id": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-test@2.13.0-52.el8fdp?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"product": {
"name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"product_id": "python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-websocket-client@0.54.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-string_utils-0:0.6.0-4.el8ost.noarch",
"product": {
"name": "python3-string_utils-0:0.6.0-4.el8ost.noarch",
"product_id": "python3-string_utils-0:0.6.0-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-string_utils@0.6.0-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-google-auth-0:1.3.0-1.el8ost.noarch",
"product": {
"name": "python3-google-auth-0:1.3.0-1.el8ost.noarch",
"product_id": "python3-google-auth-0:1.3.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-google-auth@1.3.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"product": {
"name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"product_id": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-dictdiffer@0.7.1-2.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-certifi-0:2018.10.15-4.el8ost.noarch",
"product": {
"name": "python3-certifi-0:2018.10.15-4.el8ost.noarch",
"product_id": "python3-certifi-0:2018.10.15-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-certifi@2018.10.15-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-cachetools-0:3.1.0-1.el8ost.noarch",
"product": {
"name": "python2-cachetools-0:3.1.0-1.el8ost.noarch",
"product_id": "python2-cachetools-0:3.1.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-cachetools@3.1.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-cachetools-0:3.1.0-1.el8ost.noarch",
"product": {
"name": "python3-cachetools-0:3.1.0-1.el8ost.noarch",
"product_id": "python3-cachetools-0:3.1.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-cachetools@3.1.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"product": {
"name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"product_id": "python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-s3transfer@0.2.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-boto3-0:1.9.101-1.el8ost.noarch",
"product": {
"name": "python3-boto3-0:1.9.101-1.el8ost.noarch",
"product_id": "python3-boto3-0:1.9.101-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-boto3@1.9.101-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-botocore-0:1.12.119-1.el8ost.noarch",
"product": {
"name": "python2-botocore-0:1.12.119-1.el8ost.noarch",
"product_id": "python2-botocore-0:1.12.119-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-botocore@1.12.119-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-botocore-0:1.12.119-1.el8ost.noarch",
"product": {
"name": "python3-botocore-0:1.12.119-1.el8ost.noarch",
"product_id": "python3-botocore-0:1.12.119-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-botocore@1.12.119-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-0:2.235.5.1600670743-1.el8.noarch",
"product": {
"name": "jenkins-0:2.235.5.1600670743-1.el8.noarch",
"product_id": "jenkins-0:2.235.5.1600670743-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.235.5.1600670743-1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product": {
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product_id": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-python-agent@6.3.1-0.20200918042952.9dd968f.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product": {
"name": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product_id": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ironic-python-agent@6.3.1-0.20200918042952.9dd968f.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-tenacity-0:6.2.0-1.el8ost.noarch",
"product": {
"name": "python3-tenacity-0:6.2.0-1.el8ost.noarch",
"product_id": "python3-tenacity-0:6.2.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tenacity@6.2.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"product": {
"name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"product_id": "python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-werkzeug@1.0.1-3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product": {
"name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product_id": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-sushy-oem-idrac@0.0.3-0.20200922221223.1202372.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product": {
"name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product_id": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-sushy-oem-idrac-tests@0.0.3-0.20200922221223.1202372.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product": {
"name": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_id": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-api@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product": {
"name": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_id": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-common@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product": {
"name": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_id": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-conductor@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product": {
"name": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_id": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ironic-tests@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product": {
"name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_id": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-oslo-db-lang@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product": {
"name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_id": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-oslo-db@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product": {
"name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_id": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-oslo-db-tests@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-alembic-0:1.4.2-5.el8ost.noarch",
"product": {
"name": "python3-alembic-0:1.4.2-5.el8ost.noarch",
"product_id": "python3-alembic-0:1.4.2-5.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-alembic@1.4.2-5.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.24.1.el8_2.dt1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_id": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.24.1.el8_2.dt1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"product": {
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"product_id": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/console-login-helper-messages@0.19-3.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"product": {
"name": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"product_id": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/console-login-helper-messages-issuegen@0.19-3.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"product": {
"name": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"product_id": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/console-login-helper-messages-profile@0.19-3.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-boto3-0:1.4.0-1.el7.noarch",
"product": {
"name": "python2-boto3-0:1.4.0-1.el7.noarch",
"product_id": "python2-boto3-0:1.4.0-1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-boto3@1.4.0-1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-botocore-0:1.4.57-5.el7.noarch",
"product": {
"name": "python2-botocore-0:1.4.57-5.el7.noarch",
"product_id": "python2-botocore-0:1.4.57-5.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-botocore@1.4.57-5.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-s3transfer-0:0.1.3-1.el7.noarch",
"product": {
"name": "python2-s3transfer-0:0.1.3-1.el7.noarch",
"product_id": "python2-s3transfer-0:0.1.3-1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-s3transfer@0.1.3-1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product_id": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202010011112.p0.git.0.f35f5eb.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product_id": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.6.0-202010011112.p0.git.0.f35f5eb.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"product": {
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"product_id": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/linux-firmware@20200512-98.gitb2cad6a2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "libunwind-0:1.2.1-5.el8.src",
"product": {
"name": "libunwind-0:1.2.1-5.el8.src",
"product_id": "libunwind-0:1.2.1-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "libnftnl-0:1.1.5-4.el8.src",
"product": {
"name": "libnftnl-0:1.1.5-4.el8.src",
"product_id": "libnftnl-0:1.1.5-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "gperftools-0:2.6.3-2.el8+7.src",
"product": {
"name": "gperftools-0:2.6.3-2.el8+7.src",
"product_id": "gperftools-0:2.6.3-2.el8+7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=src"
}
}
},
{
"category": "product_version",
"name": "libsodium-0:1.0.16-4.5.el8ost.src",
"product": {
"name": "libsodium-0:1.0.16-4.5.el8ost.src",
"product_id": "libsodium-0:1.0.16-4.5.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"product": {
"name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"product_id": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-kuryr-lib@1.1.1-0.20190923160834.41e6964.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.src",
"product": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.src",
"product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pyroute2-0:0.5.3-4.el8ost.src",
"product": {
"name": "python-pyroute2-0:0.5.3-4.el8ost.src",
"product_id": "python-pyroute2-0:0.5.3-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pyroute2@0.5.3-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el8.src",
"product": {
"name": "cri-tools-0:1.18.0-3.el8.src",
"product_id": "cri-tools-0:1.18.0-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "protobuf-0:3.6.1-4.el8ost.src",
"product": {
"name": "protobuf-0:3.6.1-4.el8ost.src",
"product_id": "protobuf-0:3.6.1-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"product": {
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"product_id": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhcos-tools@0.0.0-1.rhaos4.2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "grpc-0:1.18.0-4.el8ost.src",
"product": {
"name": "grpc-0:1.18.0-4.el8ost.src",
"product_id": "grpc-0:1.18.0-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"product": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "dracut-0:049-75.git20200422.el8.src",
"product": {
"name": "dracut-0:049-75.git20200422.el8.src",
"product_id": "dracut-0:049-75.git20200422.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:46.82-2.el8.src",
"product": {
"name": "redhat-release-coreos-0:46.82-2.el8.src",
"product_id": "redhat-release-coreos-0:46.82-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"product": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-4.el8.src",
"product": {
"name": "faq-0:0.0.6-4.el8.src",
"product_id": "faq-0:0.0.6-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el8.src",
"product": {
"name": "jq-0:1.6-2.el8.src",
"product_id": "jq-0:1.6-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.1.1c-15.el8.src",
"product": {
"name": "openssl-1:1.1.1c-15.el8.src",
"product_id": "openssl-1:1.1.1c-15.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tini-0:0.16.1-1.el8ar.src",
"product": {
"name": "tini-0:0.16.1-1.el8ar.src",
"product_id": "tini-0:0.16.1-1.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-psutil-0:5.6.6-1.el8ar.src",
"product": {
"name": "python-psutil-0:5.6.6-1.el8ar.src",
"product_id": "python-psutil-0:5.6.6-1.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil@5.6.6-1.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-http-0:1.0.0-2.el8ar.src",
"product": {
"name": "ansible-runner-http-0:1.0.0-2.el8ar.src",
"product_id": "ansible-runner-http-0:1.0.0-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-http@1.0.0-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"product": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-0:3.20.1-2.el8.src",
"product": {
"name": "inotify-tools-0:3.20.1-2.el8.src",
"product_id": "inotify-tools-0:3.20.1-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"product": {
"name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"product_id": "python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests-unixsocket@0.1.5-5.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"product": {
"name": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"product_id": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ironic-lib@4.3.0-0.20200605221931.df238ba.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"product": {
"name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"product_id": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-openstacksdk@0.48.0-0.20200708092906.3b693c2.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"product": {
"name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"product_id": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-keystoneauth1@4.2.0-0.20200630234358.dab8e10.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-zeroconf-0:0.24.4-1.el8ost.src",
"product": {
"name": "python-zeroconf-0:0.24.4-1.el8ost.src",
"product_id": "python-zeroconf-0:0.24.4-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-zeroconf@0.24.4-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-ifaddr-0:0.1.6-5.el8ost.src",
"product": {
"name": "python-ifaddr-0:0.1.6-5.el8ost.src",
"product_id": "python-ifaddr-0:0.1.6-5.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ifaddr@0.1.6-5.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-construct-0:2.10.56-1.el8ost.src",
"product": {
"name": "python-construct-0:2.10.56-1.el8ost.src",
"product_id": "python-construct-0:2.10.56-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-construct@2.10.56-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-kubernetes-0:11.0.0-1.el8.src",
"product": {
"name": "python-kubernetes-0:11.0.0-1.el8.src",
"product_id": "python-kubernetes-0:11.0.0-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-kubernetes@11.0.0-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-openshift-1:0.11.2-1.el8.src",
"product": {
"name": "python-openshift-1:0.11.2-1.el8.src",
"product_id": "python-openshift-1:0.11.2-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-openshift@0.11.2-1.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"product": {
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"product_id": "rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images@17.0-20200606.1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-1:1.22.8-6.el8_2.src",
"product": {
"name": "NetworkManager-1:1.22.8-6.el8_2.src",
"product_id": "NetworkManager-1:1.22.8-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "haproxy-0:2.0.16-3.el8.src",
"product": {
"name": "haproxy-0:2.0.16-3.el8.src",
"product_id": "haproxy-0:2.0.16-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy@2.0.16-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pexpect-0:4.6-2.el8ar.src",
"product": {
"name": "python-pexpect-0:4.6-2.el8ar.src",
"product_id": "python-pexpect-0:4.6-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pexpect@4.6-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-lockfile-1:0.11.0-8.el8ar.src",
"product": {
"name": "python-lockfile-1:0.11.0-8.el8ar.src",
"product_id": "python-lockfile-1:0.11.0-8.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lockfile@0.11.0-8.el8ar?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-daemon-0:2.1.2-9.el8ar.src",
"product": {
"name": "python-daemon-0:2.1.2-9.el8ar.src",
"product_id": "python-daemon-0:2.1.2-9.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-daemon@2.1.2-9.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.src",
"product": {
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.src",
"product_id": "toolbox-0:0.0.8-1.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.8-1.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"product": {
"name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"product_id": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-tooz@2.7.0-0.20200723133754.fca43df.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-rsa-0:4.6-1.el8.src",
"product": {
"name": "python-rsa-0:4.6-1.el8.src",
"product_id": "python-rsa-0:4.6-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-rsa@4.6-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"product": {
"name": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"product_id": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-oslo-concurrency@4.2.0-0.20200708091908.35e4df4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-0:2020.4-1.el8.src",
"product": {
"name": "rpm-ostree-0:2020.4-1.el8.src",
"product_id": "rpm-ostree-0:2020.4-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"product": {
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"product_id": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-flask-1:1.1.1-1.el8ost.src",
"product": {
"name": "python-flask-1:1.1.1-1.el8ost.src",
"product_id": "python-flask-1:1.1.1-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-flask@1.1.1-1.el8ost?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"product": {
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"product_id": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.144.0-1.rhaos4.6.el8?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python-pbr-0:5.4.3-2.el8ost.src",
"product": {
"name": "python-pbr-0:5.4.3-2.el8ost.src",
"product_id": "python-pbr-0:5.4.3-2.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pbr@5.4.3-2.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"product": {
"name": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"product_id": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sushy@3.3.0-0.20200804091926.0dfe74a.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.src",
"product": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.src",
"product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-websocket-client-0:0.54.0-1.el8ost.src",
"product": {
"name": "python-websocket-client-0:0.54.0-1.el8ost.src",
"product_id": "python-websocket-client-0:0.54.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-websocket-client@0.54.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-string_utils-0:0.6.0-4.el8ost.src",
"product": {
"name": "python-string_utils-0:0.6.0-4.el8ost.src",
"product_id": "python-string_utils-0:0.6.0-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-string_utils@0.6.0-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"product": {
"name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"product_id": "python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ruamel-yaml@0.15.41-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-google-auth-0:1.3.0-1.el8ost.src",
"product": {
"name": "python-google-auth-0:1.3.0-1.el8ost.src",
"product_id": "python-google-auth-0:1.3.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-google-auth@1.3.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-dictdiffer-0:0.7.1-2.el8ost.src",
"product": {
"name": "python-dictdiffer-0:0.7.1-2.el8ost.src",
"product_id": "python-dictdiffer-0:0.7.1-2.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-dictdiffer@0.7.1-2.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-certifi-0:2018.10.15-4.el8ost.src",
"product": {
"name": "python-certifi-0:2018.10.15-4.el8ost.src",
"product_id": "python-certifi-0:2018.10.15-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-certifi@2018.10.15-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-cachetools-0:3.1.0-1.el8ost.src",
"product": {
"name": "python-cachetools-0:3.1.0-1.el8ost.src",
"product_id": "python-cachetools-0:3.1.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cachetools@3.1.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-s3transfer-0:0.2.0-1.el8ost.src",
"product": {
"name": "python-s3transfer-0:0.2.0-1.el8ost.src",
"product_id": "python-s3transfer-0:0.2.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-s3transfer@0.2.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-boto3-0:1.9.101-1.el8ost.src",
"product": {
"name": "python-boto3-0:1.9.101-1.el8ost.src",
"product_id": "python-boto3-0:1.9.101-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-boto3@1.9.101-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-botocore-0:1.12.119-1.el8ost.src",
"product": {
"name": "python-botocore-0:1.12.119-1.el8ost.src",
"product_id": "python-botocore-0:1.12.119-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-botocore@1.12.119-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"product": {
"name": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"product_id": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rust-afterburn@4.5.0-2.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-0:2.235.5.1600670743-1.el8.src",
"product": {
"name": "jenkins-0:2.235.5.1600670743-1.el8.src",
"product_id": "jenkins-0:2.235.5.1600670743-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.235.5.1600670743-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"product": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"product": {
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"product_id": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-python-agent@6.3.1-0.20200918042952.9dd968f.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-tenacity-0:6.2.0-1.el8ost.src",
"product": {
"name": "python-tenacity-0:6.2.0-1.el8ost.src",
"product_id": "python-tenacity-0:6.2.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-tenacity@6.2.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-werkzeug-0:1.0.1-3.el8ost.src",
"product": {
"name": "python-werkzeug-0:1.0.1-3.el8ost.src",
"product_id": "python-werkzeug-0:1.0.1-3.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-werkzeug@1.0.1-3.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "ostree-0:2020.5-4.el8.src",
"product": {
"name": "ostree-0:2020.5-4.el8.src",
"product_id": "ostree-0:2020.5-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.src",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.src",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"product": {
"name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"product_id": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sushy-oem-idrac@0.0.3-0.20200922221223.1202372.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"product": {
"name": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"product_id": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"product": {
"name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"product_id": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-oslo-db@8.4.0-0.20200918104110.e42c733.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-alembic-0:1.4.2-5.el8ost.src",
"product": {
"name": "python-alembic-0:1.4.2-5.el8ost.src",
"product_id": "python-alembic-0:1.4.2-5.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-alembic@1.4.2-5.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"product": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"product": {
"name": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"product_id": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"product": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-0:20.09.0-1.el8fdp.src",
"product": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.src",
"product_id": "ovn2.13-0:20.09.0-1.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"product": {
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"product_id": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202010022112.p0.git.94033.ef41184.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"product": {
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"product_id": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/console-login-helper-messages@0.19-3.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-boto3-0:1.4.0-1.el7.src",
"product": {
"name": "python-boto3-0:1.4.0-1.el7.src",
"product_id": "python-boto3-0:1.4.0-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-boto3@1.4.0-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-botocore-0:1.4.57-5.el7.src",
"product": {
"name": "python-botocore-0:1.4.57-5.el7.src",
"product_id": "python-botocore-0:1.4.57-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-botocore@1.4.57-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el7.src",
"product": {
"name": "cri-tools-0:1.18.0-3.el7.src",
"product_id": "cri-tools-0:1.18.0-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "oniguruma-0:5.9.2-5.el7.src",
"product": {
"name": "oniguruma-0:5.9.2-5.el7.src",
"product_id": "oniguruma-0:5.9.2-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@5.9.2-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el7.src",
"product": {
"name": "jq-0:1.6-2.el7.src",
"product_id": "jq-0:1.6-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-s3transfer-0:0.1.3-1.el7.src",
"product": {
"name": "python-s3transfer-0:0.1.3-1.el7.src",
"product_id": "python-s3transfer-0:0.1.3-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-s3transfer@0.1.3-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.src",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.src",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el7?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"product": {
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"product_id": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202010011112.p0.git.0.f35f5eb.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"product": {
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"product_id": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-113.rhaos4.6.git97d715e.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"product": {
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"product_id": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202010022112.p0.git.94033.ef41184.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "s390utils-2:2.6.0-28.el8_2.2.src",
"product": {
"name": "s390utils-2:2.6.0-28.el8_2.2.src",
"product_id": "s390utils-2:2.6.0-28.el8_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils@2.6.0-28.el8_2.2?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libunwind-0:1.2.1-5.el8.ppc64le",
"product": {
"name": "libunwind-0:1.2.1-5.el8.ppc64le",
"product_id": "libunwind-0:1.2.1-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libunwind-devel-0:1.2.1-5.el8.ppc64le",
"product": {
"name": "libunwind-devel-0:1.2.1-5.el8.ppc64le",
"product_id": "libunwind-devel-0:1.2.1-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-devel@1.2.1-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"product": {
"name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"product_id": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-debugsource@1.2.1-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"product": {
"name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"product_id": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-debuginfo@1.2.1-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnftnl-0:1.1.5-4.el8.ppc64le",
"product": {
"name": "libnftnl-0:1.1.5-4.el8.ppc64le",
"product_id": "libnftnl-0:1.1.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"product": {
"name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"product_id": "libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"product": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"product_id": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"product": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el8.ppc64le",
"product": {
"name": "cri-tools-0:1.18.0-3.el8.ppc64le",
"product_id": "cri-tools-0:1.18.0-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"product_id": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"product_id": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"product_id": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_id": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debugsource@2.18.1-12.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_id": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debuginfo@2.18.1-12.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-caps-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-caps-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-live-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-live-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-live-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-live@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-network-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-network-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-squash-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-squash-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-squash-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-squash@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-tools-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-tools-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debugsource@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:46.82-2.el8.ppc64le",
"product": {
"name": "redhat-release-coreos-0:46.82-2.el8.ppc64le",
"product_id": "redhat-release-coreos-0:46.82-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"product": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-4.el8.ppc64le",
"product": {
"name": "faq-0:0.0.6-4.el8.ppc64le",
"product_id": "faq-0:0.0.6-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el8.ppc64le",
"product": {
"name": "jq-0:1.6-2.el8.ppc64le",
"product_id": "jq-0:1.6-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jq-devel-0:1.6-2.el8.ppc64le",
"product": {
"name": "jq-devel-0:1.6-2.el8.ppc64le",
"product_id": "jq-devel-0:1.6-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jq-debugsource-0:1.6-2.el8.ppc64le",
"product": {
"name": "jq-debugsource-0:1.6-2.el8.ppc64le",
"product_id": "jq-debugsource-0:1.6-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jq-debuginfo-0:1.6-2.el8.ppc64le",
"product": {
"name": "jq-debuginfo-0:1.6-2.el8.ppc64le",
"product_id": "jq-debuginfo-0:1.6-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-devel-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-libs-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-perl-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-static-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-static-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tini-0:0.16.1-1.el8ar.ppc64le",
"product": {
"name": "tini-0:0.16.1-1.el8ar.ppc64le",
"product_id": "tini-0:0.16.1-1.el8ar.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"product": {
"name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"product_id": "python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"product": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"product": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-0:3.20.1-2.el8.ppc64le",
"product": {
"name": "inotify-tools-0:3.20.1-2.el8.ppc64le",
"product_id": "inotify-tools-0:3.20.1-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"product": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"product_id": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"product": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"product": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "haproxy20-0:2.0.16-3.el8.ppc64le",
"product": {
"name": "haproxy20-0:2.0.16-3.el8.ppc64le",
"product_id": "haproxy20-0:2.0.16-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20@2.0.16-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"product": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"product_id": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.16-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"product": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"product_id": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.16-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"product": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"product": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"product": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_id": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn@4.5.0-2.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_id": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.5.0-2.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_id": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn-debuginfo@4.5.0-2.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-devel-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-devel-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-devel-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-devel@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-grub2-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-grub2-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-grub2-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-grub2@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-libs-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-libs-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-debugsource-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-debugsource-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-debugsource-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debugsource@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debuginfo@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.0-20.rhaos4.6.git97d715e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-20.rhaos4.6.git97d715e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-1.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libunwind-0:1.2.1-5.el8.x86_64",
"product": {
"name": "libunwind-0:1.2.1-5.el8.x86_64",
"product_id": "libunwind-0:1.2.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libunwind-devel-0:1.2.1-5.el8.x86_64",
"product": {
"name": "libunwind-devel-0:1.2.1-5.el8.x86_64",
"product_id": "libunwind-devel-0:1.2.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-devel@1.2.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"product": {
"name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"product_id": "libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-debugsource@1.2.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"product": {
"name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"product_id": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-debuginfo@1.2.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnftnl-0:1.1.5-4.el8.x86_64",
"product": {
"name": "libnftnl-0:1.1.5-4.el8.x86_64",
"product_id": "libnftnl-0:1.1.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnftnl-devel-0:1.1.5-4.el8.x86_64",
"product": {
"name": "libnftnl-devel-0:1.1.5-4.el8.x86_64",
"product_id": "libnftnl-devel-0:1.1.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"product": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"product_id": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"product": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el8.x86_64",
"product": {
"name": "cri-tools-0:1.18.0-3.el8.x86_64",
"product_id": "cri-tools-0:1.18.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"product_id": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"product_id": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-static-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-static-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-static-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-cli-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-cli-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-devel-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-devel-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-devel-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"product_id": "python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_id": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debugsource@2.18.1-12.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_id": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debuginfo@2.18.1-12.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-caps-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-caps-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-live-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-live-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-live-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-live@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-network-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-network-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-squash-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-squash-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-squash-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-squash@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-tools-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-tools-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debugsource@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:46.82-2.el8.x86_64",
"product": {
"name": "redhat-release-coreos-0:46.82-2.el8.x86_64",
"product_id": "redhat-release-coreos-0:46.82-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"product": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-4.el8.x86_64",
"product": {
"name": "faq-0:0.0.6-4.el8.x86_64",
"product_id": "faq-0:0.0.6-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el8.x86_64",
"product": {
"name": "jq-0:1.6-2.el8.x86_64",
"product_id": "jq-0:1.6-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-devel-0:1.6-2.el8.x86_64",
"product": {
"name": "jq-devel-0:1.6-2.el8.x86_64",
"product_id": "jq-devel-0:1.6-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-debugsource-0:1.6-2.el8.x86_64",
"product": {
"name": "jq-debugsource-0:1.6-2.el8.x86_64",
"product_id": "jq-debugsource-0:1.6-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-debuginfo-0:1.6-2.el8.x86_64",
"product": {
"name": "jq-debuginfo-0:1.6-2.el8.x86_64",
"product_id": "jq-debuginfo-0:1.6-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-devel-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-libs-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-perl-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-static-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-static-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tini-0:0.16.1-1.el8ar.x86_64",
"product": {
"name": "tini-0:0.16.1-1.el8ar.x86_64",
"product_id": "tini-0:0.16.1-1.el8ar.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-0:5.6.6-1.el8ar.x86_64",
"product": {
"name": "python3-psutil-0:5.6.6-1.el8ar.x86_64",
"product_id": "python3-psutil-0:5.6.6-1.el8ar.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"product": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"product": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-0:3.20.1-2.el8.x86_64",
"product": {
"name": "inotify-tools-0:3.20.1-2.el8.x86_64",
"product_id": "inotify-tools-0:3.20.1-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"product": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"product_id": "inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"product": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"product": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "haproxy20-0:2.0.16-3.el8.x86_64",
"product": {
"name": "haproxy20-0:2.0.16-3.el8.x86_64",
"product_id": "haproxy20-0:2.0.16-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20@2.0.16-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"product": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"product_id": "haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.16-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"product": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"product_id": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.16-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_id": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"product_id": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_id": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"product_id": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product_id": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"product": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"product": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"product": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_id": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn@4.5.0-2.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_id": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.5.0-2.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_id": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn-debuginfo@4.5.0-2.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_id": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.6.0-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_id": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.6.0-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_id": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.6.0-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-0:2020.5-4.el8.x86_64",
"product_id": "ostree-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-devel-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-devel-0:2020.5-4.el8.x86_64",
"product_id": "ostree-devel-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-devel@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-grub2-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-grub2-0:2020.5-4.el8.x86_64",
"product_id": "ostree-grub2-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-grub2@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-libs-0:2020.5-4.el8.x86_64",
"product_id": "ostree-libs-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-debugsource-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-debugsource-0:2020.5-4.el8.x86_64",
"product_id": "ostree-debugsource-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debugsource@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-debuginfo-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-debuginfo-0:2020.5-4.el8.x86_64",
"product_id": "ostree-debuginfo-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debuginfo@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"product_id": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-selftests-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.0-20.rhaos4.6.git97d715e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-20.rhaos4.6.git97d715e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202010022112.p0.git.94033.ef41184.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el7.x86_64",
"product": {
"name": "cri-tools-0:1.18.0-3.el7.x86_64",
"product_id": "cri-tools-0:1.18.0-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"product_id": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-0:5.9.2-5.el7.x86_64",
"product": {
"name": "oniguruma-0:5.9.2-5.el7.x86_64",
"product_id": "oniguruma-0:5.9.2-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@5.9.2-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-devel-0:5.9.2-5.el7.x86_64",
"product": {
"name": "oniguruma-devel-0:5.9.2-5.el7.x86_64",
"product_id": "oniguruma-devel-0:5.9.2-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@5.9.2-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"product": {
"name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"product_id": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@5.9.2-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el7.x86_64",
"product": {
"name": "jq-0:1.6-2.el7.x86_64",
"product_id": "jq-0:1.6-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-devel-0:1.6-2.el7.x86_64",
"product": {
"name": "jq-devel-0:1.6-2.el7.x86_64",
"product_id": "jq-devel-0:1.6-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-devel@1.6-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-debuginfo-0:1.6-2.el7.x86_64",
"product": {
"name": "jq-debuginfo-0:1.6-2.el7.x86_64",
"product_id": "jq-debuginfo-0:1.6-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product": {
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product_id": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-113.rhaos4.6.git97d715e.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-113.rhaos4.6.git97d715e.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202010022112.p0.git.94033.ef41184.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libnftnl-0:1.1.5-4.el8.s390x",
"product": {
"name": "libnftnl-0:1.1.5-4.el8.s390x",
"product_id": "libnftnl-0:1.1.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnftnl-devel-0:1.1.5-4.el8.s390x",
"product": {
"name": "libnftnl-devel-0:1.1.5-4.el8.s390x",
"product_id": "libnftnl-devel-0:1.1.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"product": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"product_id": "libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"product": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-devel-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-devel-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-libs-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el8.s390x",
"product": {
"name": "cri-tools-0:1.18.0-3.el8.s390x",
"product_id": "cri-tools-0:1.18.0-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"product_id": "cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"product_id": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-devel-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-devel-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-lite-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-static-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-static-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-static-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-cli-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-cli-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-devel-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-devel-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-devel-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-plugins-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.s390x",
"product_id": "python3-grpcio-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"product": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"product": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_id": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debugsource@2.18.1-12.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"product": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_id": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debuginfo@2.18.1-12.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-caps-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-caps-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-config-generic-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-live-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-live-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-live-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-live@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-network-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-network-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-squash-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-squash-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-squash-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-squash@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-tools-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-tools-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-debugsource-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-debugsource-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debugsource@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:46.82-2.el8.s390x",
"product": {
"name": "redhat-release-coreos-0:46.82-2.el8.s390x",
"product_id": "redhat-release-coreos-0:46.82-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"product": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-4.el8.s390x",
"product": {
"name": "faq-0:0.0.6-4.el8.s390x",
"product_id": "faq-0:0.0.6-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el8.s390x",
"product": {
"name": "jq-0:1.6-2.el8.s390x",
"product_id": "jq-0:1.6-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jq-devel-0:1.6-2.el8.s390x",
"product": {
"name": "jq-devel-0:1.6-2.el8.s390x",
"product_id": "jq-devel-0:1.6-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jq-debugsource-0:1.6-2.el8.s390x",
"product": {
"name": "jq-debugsource-0:1.6-2.el8.s390x",
"product_id": "jq-debugsource-0:1.6-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jq-debuginfo-0:1.6-2.el8.s390x",
"product": {
"name": "jq-debuginfo-0:1.6-2.el8.s390x",
"product_id": "jq-debuginfo-0:1.6-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-devel-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-devel-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-libs-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-libs-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-perl-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-perl-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-static-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-static-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-debugsource-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tini-0:0.16.1-1.el8ar.s390x",
"product": {
"name": "tini-0:0.16.1-1.el8ar.s390x",
"product_id": "tini-0:0.16.1-1.el8ar.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-0:5.6.6-1.el8ar.s390x",
"product": {
"name": "python3-psutil-0:5.6.6-1.el8ar.s390x",
"product_id": "python3-psutil-0:5.6.6-1.el8ar.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"product": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"product": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-0:3.20.1-2.el8.s390x",
"product": {
"name": "inotify-tools-0:3.20.1-2.el8.s390x",
"product_id": "inotify-tools-0:3.20.1-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-devel-0:3.20.1-2.el8.s390x",
"product": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.s390x",
"product_id": "inotify-tools-devel-0:3.20.1-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"product": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"product": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "haproxy20-0:2.0.16-3.el8.s390x",
"product": {
"name": "haproxy20-0:2.0.16-3.el8.s390x",
"product_id": "haproxy20-0:2.0.16-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20@2.0.16-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "haproxy-debugsource-0:2.0.16-3.el8.s390x",
"product": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.s390x",
"product_id": "haproxy-debugsource-0:2.0.16-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.16-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"product": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"product_id": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.16-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-devel-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-devel-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-libs-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_id": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"product_id": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_id": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"product_id": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product_id": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"product": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"product": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"product": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"product": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_id": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn@4.5.0-2.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"product": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_id": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.5.0-2.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"product": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_id": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn-debuginfo@4.5.0-2.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-0:2020.5-4.el8.s390x",
"product_id": "ostree-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-devel-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-devel-0:2020.5-4.el8.s390x",
"product_id": "ostree-devel-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-devel@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-libs-0:2020.5-4.el8.s390x",
"product_id": "ostree-libs-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-debugsource-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-debugsource-0:2020.5-4.el8.s390x",
"product_id": "ostree-debugsource-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debugsource@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-debuginfo-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-debuginfo-0:2020.5-4.el8.s390x",
"product_id": "ostree-debuginfo-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debuginfo@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"product_id": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_id": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.0-20.rhaos4.6.git97d715e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-20.rhaos4.6.git97d715e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "s390utils-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-base@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cmsfs@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cmsfs-fuse@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cpacfstatsd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cpuplugd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-devel@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-hmcdrvfs@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-iucvterm@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-mon_statd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-osasnmpd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-zdsfs@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-ziomon@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-debugsource@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-base-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cmsfs-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cmsfs-fuse-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cpacfstatsd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cpuplugd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-hmcdrvfs-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-iucvterm-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-mon_statd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-osasnmpd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-zdsfs-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-ziomon-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src"
},
"product_reference": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64"
},
"product_reference": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src"
},
"product_reference": "cri-tools-0:1.18.0-3.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64"
},
"product_reference": "cri-tools-0:1.18.0-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src"
},
"product_reference": "jq-0:1.6-2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64"
},
"product_reference": "jq-0:1.6-2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debuginfo-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64"
},
"product_reference": "jq-debuginfo-0:1.6-2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-devel-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64"
},
"product_reference": "jq-devel-0:1.6-2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:5.9.2-5.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src"
},
"product_reference": "oniguruma-0:5.9.2-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64"
},
"product_reference": "oniguruma-0:5.9.2-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64"
},
"product_reference": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64"
},
"product_reference": "oniguruma-devel-0:5.9.2-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src"
},
"product_reference": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src"
},
"product_reference": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-boto3-0:1.4.0-1.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src"
},
"product_reference": "python-boto3-0:1.4.0-1.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-botocore-0:1.4.57-5.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src"
},
"product_reference": "python-botocore-0:1.4.57-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-s3transfer-0:0.1.3-1.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src"
},
"product_reference": "python-s3transfer-0:0.1.3-1.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-boto3-0:1.4.0-1.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch"
},
"product_reference": "python2-boto3-0:1.4.0-1.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-botocore-0:1.4.57-5.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch"
},
"product_reference": "python2-botocore-0:1.4.57-5.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-s3transfer-0:0.1.3-1.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch"
},
"product_reference": "python2-s3transfer-0:0.1.3-1.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-2:2.6.0-28.el8_2.2.src as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src"
},
"product_reference": "s390utils-2:2.6.0-28.el8_2.2.src",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-base-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-1:1.22.8-6.el8_2.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src"
},
"product_reference": "NetworkManager-1:1.22.8-6.el8_2.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch"
},
"product_reference": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch"
},
"product_reference": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch"
},
"product_reference": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x"
},
"product_reference": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64"
},
"product_reference": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x"
},
"product_reference": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64"
},
"product_reference": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch"
},
"product_reference": "ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-http-0:1.0.0-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src"
},
"product_reference": "ansible-runner-http-0:1.0.0-2.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src"
},
"product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch"
},
"product_reference": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src"
},
"product_reference": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch"
},
"product_reference": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch"
},
"product_reference": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch"
},
"product_reference": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src"
},
"product_reference": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src"
},
"product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64"
},
"product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64"
},
"product_reference": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64"
},
"product_reference": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64"
},
"product_reference": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le"
},
"product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x"
},
"product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src"
},
"product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64"
},
"product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le"
},
"product_reference": "cri-tools-0:1.18.0-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x"
},
"product_reference": "cri-tools-0:1.18.0-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src"
},
"product_reference": "cri-tools-0:1.18.0-3.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64"
},
"product_reference": "cri-tools-0:1.18.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:049-75.git20200422.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src"
},
"product_reference": "dracut-0:049-75.git20200422.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-caps-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-caps-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-caps-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-config-generic-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-debugsource-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-live-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-live-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-live-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-live-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-live-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-live-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-network-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-network-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-network-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-squash-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-squash-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-squash-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-squash-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-squash-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-squash-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-tools-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-tools-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-tools-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le"
},
"product_reference": "faq-0:0.0.6-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x"
},
"product_reference": "faq-0:0.0.6-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src"
},
"product_reference": "faq-0:0.0.6-4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64"
},
"product_reference": "faq-0:0.0.6-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-0:2.6.3-2.el8+7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src"
},
"product_reference": "gperftools-0:2.6.3-2.el8+7.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-devel-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-libs-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-0:1.18.0-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src"
},
"product_reference": "grpc-0:1.18.0-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-cli-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-cli-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-devel-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-devel-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-plugins-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy-0:2.0.16-3.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src"
},
"product_reference": "haproxy-0:2.0.16-3.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le"
},
"product_reference": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x"
},
"product_reference": "haproxy-debugsource-0:2.0.16-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64"
},
"product_reference": "haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-0:2.0.16-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le"
},
"product_reference": "haproxy20-0:2.0.16-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-0:2.0.16-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x"
},
"product_reference": "haproxy20-0:2.0.16-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-0:2.0.16-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64"
},
"product_reference": "haproxy20-0:2.0.16-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le"
},
"product_reference": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x"
},
"product_reference": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64"
},
"product_reference": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src"
},
"product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le"
},
"product_reference": "inotify-tools-0:3.20.1-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x"
},
"product_reference": "inotify-tools-0:3.20.1-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-0:3.20.1-2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src"
},
"product_reference": "inotify-tools-0:3.20.1-2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64"
},
"product_reference": "inotify-tools-0:3.20.1-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le"
},
"product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x"
},
"product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64"
},
"product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le"
},
"product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x"
},
"product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64"
},
"product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le"
},
"product_reference": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x"
},
"product_reference": "inotify-tools-devel-0:3.20.1-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64"
},
"product_reference": "inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch"
},
"product_reference": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch"
},
"product_reference": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch"
},
"product_reference": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch"
},
"product_reference": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch"
},
"product_reference": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch"
},
"product_reference": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch"
},
"product_reference": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch"
},
"product_reference": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch"
},
"product_reference": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch"
},
"product_reference": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.235.5.1600670743-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch"
},
"product_reference": "jenkins-0:2.235.5.1600670743-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.235.5.1600670743-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src"
},
"product_reference": "jenkins-0:2.235.5.1600670743-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le"
},
"product_reference": "jq-0:1.6-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x"
},
"product_reference": "jq-0:1.6-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.src"
},
"product_reference": "jq-0:1.6-2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64"
},
"product_reference": "jq-0:1.6-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debuginfo-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le"
},
"product_reference": "jq-debuginfo-0:1.6-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debuginfo-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x"
},
"product_reference": "jq-debuginfo-0:1.6-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debuginfo-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64"
},
"product_reference": "jq-debuginfo-0:1.6-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debugsource-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le"
},
"product_reference": "jq-debugsource-0:1.6-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debugsource-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x"
},
"product_reference": "jq-debugsource-0:1.6-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debugsource-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64"
},
"product_reference": "jq-debugsource-0:1.6-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-devel-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le"
},
"product_reference": "jq-devel-0:1.6-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-devel-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x"
},
"product_reference": "jq-devel-0:1.6-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-devel-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64"
},
"product_reference": "jq-devel-0:1.6-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch"
},
"product_reference": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le"
},
"product_reference": "libnftnl-0:1.1.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x"
},
"product_reference": "libnftnl-0:1.1.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-0:1.1.5-4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src"
},
"product_reference": "libnftnl-0:1.1.5-4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64"
},
"product_reference": "libnftnl-0:1.1.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le"
},
"product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x"
},
"product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64"
},
"product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le"
},
"product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x"
},
"product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64"
},
"product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le"
},
"product_reference": "libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-devel-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x"
},
"product_reference": "libnftnl-devel-0:1.1.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-devel-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64"
},
"product_reference": "libnftnl-devel-0:1.1.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-0:1.0.16-4.5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src"
},
"product_reference": "libsodium-0:1.0.16-4.5.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le"
},
"product_reference": "libunwind-0:1.2.1-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-0:1.2.1-5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src"
},
"product_reference": "libunwind-0:1.2.1-5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64"
},
"product_reference": "libunwind-0:1.2.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le"
},
"product_reference": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64"
},
"product_reference": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le"
},
"product_reference": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64"
},
"product_reference": "libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-devel-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le"
},
"product_reference": "libunwind-devel-0:1.2.1-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-devel-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64"
},
"product_reference": "libunwind-devel-0:1.2.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src"
},
"product_reference": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le"
},
"product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x"
},
"product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src"
},
"product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64"
},
"product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le"
},
"product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x"
},
"product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src"
},
"product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64"
},
"product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le"
},
"product_reference": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x"
},
"product_reference": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64"
},
"product_reference": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le"
},
"product_reference": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x"
},
"product_reference": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64"
},
"product_reference": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src"
},
"product_reference": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src"
},
"product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src"
},
"product_reference": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-15.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src"
},
"product_reference": "openssl-1:1.1.1c-15.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-devel-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-libs-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-perl-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-static-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-static-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-static-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src"
},
"product_reference": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch"
},
"product_reference": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch"
},
"product_reference": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch"
},
"product_reference": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src"
},
"product_reference": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch"
},
"product_reference": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src"
},
"product_reference": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src"
},
"product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch"
},
"product_reference": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-0:2020.5-4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src"
},
"product_reference": "ostree-0:2020.5-4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debuginfo-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debuginfo-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-debuginfo-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debuginfo-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-debuginfo-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debugsource-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-debugsource-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debugsource-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-debugsource-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debugsource-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-debugsource-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-devel-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-devel-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-devel-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-devel-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-devel-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-devel-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-grub2-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-grub2-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-grub2-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-grub2-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-libs-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-libs-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-libs-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src"
},
"product_reference": "ovn2.13-0:20.09.0-1.el8fdp.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pprof-0:2.6.3-2.el8+7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch"
},
"product_reference": "pprof-0:2.6.3-2.el8+7.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le"
},
"product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x"
},
"product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64"
},
"product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-0:3.6.1-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src"
},
"product_reference": "protobuf-0:3.6.1-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-devel-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-lite-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-static-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-static-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-static-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-static-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-vim-0:3.6.1-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch"
},
"product_reference": "protobuf-vim-0:3.6.1-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-alembic-0:1.4.2-5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src"
},
"product_reference": "python-alembic-0:1.4.2-5.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-boto3-0:1.9.101-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src"
},
"product_reference": "python-boto3-0:1.9.101-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-botocore-0:1.12.119-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src"
},
"product_reference": "python-botocore-0:1.12.119-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cachetools-0:3.1.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src"
},
"product_reference": "python-cachetools-0:3.1.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-certifi-0:2018.10.15-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src"
},
"product_reference": "python-certifi-0:2018.10.15-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-construct-0:2.10.56-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src"
},
"product_reference": "python-construct-0:2.10.56-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-daemon-0:2.1.2-9.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src"
},
"product_reference": "python-daemon-0:2.1.2-9.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-dictdiffer-0:0.7.1-2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src"
},
"product_reference": "python-dictdiffer-0:0.7.1-2.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-flask-1:1.1.1-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src"
},
"product_reference": "python-flask-1:1.1.1-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-flask-doc-1:1.1.1-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch"
},
"product_reference": "python-flask-doc-1:1.1.1-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-google-auth-0:1.3.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src"
},
"product_reference": "python-google-auth-0:1.3.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ifaddr-0:0.1.6-5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src"
},
"product_reference": "python-ifaddr-0:0.1.6-5.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src"
},
"product_reference": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src"
},
"product_reference": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-kubernetes-0:11.0.0-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src"
},
"product_reference": "python-kubernetes-0:11.0.0-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src"
},
"product_reference": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lockfile-1:0.11.0-8.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src"
},
"product_reference": "python-lockfile-1:0.11.0-8.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-openshift-1:0.11.2-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src"
},
"product_reference": "python-openshift-1:0.11.2-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src"
},
"product_reference": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src"
},
"product_reference": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch"
},
"product_reference": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src"
},
"product_reference": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch"
},
"product_reference": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pbr-0:5.4.3-2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src"
},
"product_reference": "python-pbr-0:5.4.3-2.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pexpect-0:4.6-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src"
},
"product_reference": "python-pexpect-0:4.6-2.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.6.6-1.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src"
},
"product_reference": "python-psutil-0:5.6.6-1.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le"
},
"product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x"
},
"product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64"
},
"product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pyroute2-0:0.5.3-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src"
},
"product_reference": "python-pyroute2-0:0.5.3-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src"
},
"product_reference": "python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rsa-0:4.6-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src"
},
"product_reference": "python-rsa-0:4.6-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src"
},
"product_reference": "python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le"
},
"product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x"
},
"product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64"
},
"product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-s3transfer-0:0.2.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src"
},
"product_reference": "python-s3transfer-0:0.2.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-string_utils-0:0.6.0-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src"
},
"product_reference": "python-string_utils-0:0.6.0-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src"
},
"product_reference": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src"
},
"product_reference": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tenacity-0:6.2.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src"
},
"product_reference": "python-tenacity-0:6.2.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src"
},
"product_reference": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-websocket-client-0:0.54.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src"
},
"product_reference": "python-websocket-client-0:0.54.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-werkzeug-0:1.0.1-3.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src"
},
"product_reference": "python-werkzeug-0:1.0.1-3.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-zeroconf-0:0.24.4-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src"
},
"product_reference": "python-zeroconf-0:0.24.4-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-botocore-0:1.12.119-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch"
},
"product_reference": "python2-botocore-0:1.12.119-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-cachetools-0:3.1.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch"
},
"product_reference": "python2-cachetools-0:3.1.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-alembic-0:1.4.2-5.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch"
},
"product_reference": "python3-alembic-0:1.4.2-5.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-boto3-0:1.9.101-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch"
},
"product_reference": "python3-boto3-0:1.9.101-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-botocore-0:1.12.119-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch"
},
"product_reference": "python3-botocore-0:1.12.119-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-cachetools-0:3.1.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch"
},
"product_reference": "python3-cachetools-0:3.1.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-certifi-0:2018.10.15-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch"
},
"product_reference": "python3-certifi-0:2018.10.15-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-construct-0:2.10.56-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch"
},
"product_reference": "python3-construct-0:2.10.56-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-daemon-0:2.1.2-9.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch"
},
"product_reference": "python3-daemon-0:2.1.2-9.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch"
},
"product_reference": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-flask-1:1.1.1-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch"
},
"product_reference": "python3-flask-1:1.1.1-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-google-auth-0:1.3.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch"
},
"product_reference": "python3-google-auth-0:1.3.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "python3-grpcio-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch"
},
"product_reference": "python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch"
},
"product_reference": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch"
},
"product_reference": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch"
},
"product_reference": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch"
},
"product_reference": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kubernetes-0:11.0.0-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch"
},
"product_reference": "python3-kubernetes-0:11.0.0-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch"
},
"product_reference": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch"
},
"product_reference": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch"
},
"product_reference": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lockfile-1:0.11.0-8.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch"
},
"product_reference": "python3-lockfile-1:0.11.0-8.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openshift-1:0.11.2-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch"
},
"product_reference": "python3-openshift-1:0.11.2-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch"
},
"product_reference": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch"
},
"product_reference": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch"
},
"product_reference": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch"
},
"product_reference": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch"
},
"product_reference": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch"
},
"product_reference": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-pbr-0:5.4.3-2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch"
},
"product_reference": "python3-pbr-0:5.4.3-2.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-pexpect-0:4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch"
},
"product_reference": "python3-pexpect-0:4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-protobuf-0:3.6.1-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch"
},
"product_reference": "python3-protobuf-0:3.6.1-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le"
},
"product_reference": "python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x"
},
"product_reference": "python3-psutil-0:5.6.6-1.el8ar.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64"
},
"product_reference": "python3-psutil-0:5.6.6-1.el8ar.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le"
},
"product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x"
},
"product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64"
},
"product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-pyroute2-0:0.5.3-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch"
},
"product_reference": "python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch"
},
"product_reference": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rsa-0:4.6-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch"
},
"product_reference": "python3-rsa-0:4.6-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le"
},
"product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x"
},
"product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64"
},
"product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le"
},
"product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x"
},
"product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64"
},
"product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch"
},
"product_reference": "python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-string_utils-0:0.6.0-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch"
},
"product_reference": "python3-string_utils-0:0.6.0-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch"
},
"product_reference": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch"
},
"product_reference": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch"
},
"product_reference": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch"
},
"product_reference": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tenacity-0:6.2.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch"
},
"product_reference": "python3-tenacity-0:6.2.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch"
},
"product_reference": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch"
},
"product_reference": "python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch"
},
"product_reference": "python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch"
},
"product_reference": "python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:46.82-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le"
},
"product_reference": "redhat-release-coreos-0:46.82-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:46.82-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x"
},
"product_reference": "redhat-release-coreos-0:46.82-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:46.82-2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src"
},
"product_reference": "redhat-release-coreos-0:46.82-2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:46.82-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64"
},
"product_reference": "redhat-release-coreos-0:46.82-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch"
},
"product_reference": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src"
},
"product_reference": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src"
},
"product_reference": "rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-0:2020.4-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src"
},
"product_reference": "rpm-ostree-0:2020.4-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-devel-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-libs-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src"
},
"product_reference": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x"
},
"product_reference": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64"
},
"product_reference": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.16.1-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le"
},
"product_reference": "tini-0:0.16.1-1.el8ar.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.16.1-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x"
},
"product_reference": "tini-0:0.16.1-1.el8ar.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.16.1-1.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src"
},
"product_reference": "tini-0:0.16.1-1.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.16.1-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64"
},
"product_reference": "tini-0:0.16.1-1.el8ar.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch"
},
"product_reference": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
},
"product_reference": "toolbox-0:0.0.8-1.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the Kubernetes Product Security Committee"
]
},
{
"names": [
"Wouter ter Maat"
],
"organization": "Offensi",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-8559",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"discovery_date": "2020-06-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1851422"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Kubernetes API server, where it allows an attacker to escalate their privileges from a compromised node. This flaw allows an attacker who can intercept requests on a compromised node, to redirect those requests, along with their credentials, to perform actions on other endpoints that trust those credentials (including other clusters), allowing for escalation of privileges. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kubernetes: compromised node could escalate to cluster level privileges",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Kubernetes is embedded in the version of heketi shipped with Red Hat Gluster Storage 3. However, it does not use Kubernetes API server part and only uses client side bits. Hence, this flaw does not affect heketi.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8559"
},
{
"category": "external",
"summary": "RHBZ#1851422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851422"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8559"
},
{
"category": "external",
"summary": "https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs",
"url": "https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs"
}
],
"release_date": "2020-07-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:47:06+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4197"
},
{
"category": "workaround",
"details": "No mitigation is known.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kubernetes: compromised node could escalate to cluster level privileges"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:47:06+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4197"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:47:06+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4197"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2021:0172
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.6.13 is now available with updates to packages and images that fix several bugs.\n\nA security update for cri-o, openshift, openshift-clients, openshift-kuryr, and skopeo is now also available for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4 (CVE-2020-8564)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.6.13. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHSA-2021:0171\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0172",
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1886637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637"
},
{
"category": "external",
"summary": "1917413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917413"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0172.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.13 packages and security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:44+00:00",
"generator": {
"date": "2025-11-06T23:52:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:0172",
"initial_release_date": "2021-01-25T19:45:30+00:00",
"revision_history": [
{
"date": "2021-01-25T19:45:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-25T19:45:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"product": {
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"product_id": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202101160934.p0.git.94242.fc5242e.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"product": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"product": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"product": {
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"product_id": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"product": {
"name": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"product_id": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202101160934.p0.git.3808.a1bca2f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_id": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.1-4.rhaos4.6.git3846aab.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.1-4.rhaos4.6.git3846aab.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.1-4.rhaos4.6.git3846aab.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.1-4.rhaos4.6.git3846aab.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_id": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_id": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.1-4.rhaos4.6.git3846aab.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.1-4.rhaos4.6.git3846aab.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"product": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src"
},
"product_reference": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le"
},
"product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x"
},
"product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src"
},
"product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64"
},
"product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src"
},
"product_reference": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src"
},
"product_reference": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src"
},
"product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the Kubernetes Product Security Committee"
]
},
{
"names": [
"Nikolaos Moraitis"
],
"organization": "Red Hat",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-8564",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1886637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This can occur with client tools like `kubectl`, or other components that use registry credentials in a docker config file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8564"
},
{
"category": "external",
"summary": "RHBZ#1886637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8564",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564"
},
{
"category": "external",
"summary": "https://github.com/kubernetes/kubernetes/issues/95622",
"url": "https://github.com/kubernetes/kubernetes/issues/95622"
},
{
"category": "external",
"summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk",
"url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk"
}
],
"release_date": "2020-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-25T19:45:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-25T19:45:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-25T19:45:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-25T19:45:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0172"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
}
]
}
rhsa-2020:5606
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for mcg is now available for Red Hat OpenShift Container Storage 4.6.0 on RHEL-8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nThese updated packages include numerous security fixes, bug fixes, and\nenhancements.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThese updated packages include numerous bug fixes and enhancements. Users are\ndirected to the Red Hat OpenShift Container Storage Release Notes for\ninformation on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.6/html/4.6_release_notes/index\n\nAll Red Hat OpenShift Container Storage users are advised to upgrade to these\nupdated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5606",
"url": "https://access.redhat.com/errata/RHSA-2020:5606"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5606.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6 bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-11-07T15:51:57+00:00",
"generator": {
"date": "2025-11-07T15:51:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:5606",
"initial_release_date": "2020-12-17T05:43:57+00:00",
"revision_history": [
{
"date": "2020-12-17T05:43:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-17T05:43:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T15:51:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product": {
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_container_storage:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Container Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "tini-0:0.18.0-5.el8.src",
"product": {
"name": "tini-0:0.18.0-5.el8.src",
"product_id": "tini-0:0.18.0-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"product": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tini-0:0.18.0-5.el8.x86_64",
"product": {
"name": "tini-0:0.18.0-5.el8.x86_64",
"product_id": "tini-0:0.18.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"product": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tini-0:0.18.0-5.el8.s390x",
"product": {
"name": "tini-0:0.18.0-5.el8.s390x",
"product_id": "tini-0:0.18.0-5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"product": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tini-0:0.18.0-5.el8.ppc64le",
"product": {
"name": "tini-0:0.18.0-5.el8.ppc64le",
"product_id": "tini-0:0.18.0-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"product": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le"
},
"product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x"
},
"product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src"
},
"product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
},
"product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.18.0-5.el8.ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le"
},
"product_reference": "tini-0:0.18.0-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.18.0-5.el8.s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x"
},
"product_reference": "tini-0:0.18.0-5.el8.s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.18.0-5.el8.src as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src"
},
"product_reference": "tini-0:0.18.0-5.el8.src",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.18.0-5.el8.x86_64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
},
"product_reference": "tini-0:0.18.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T05:43:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5606"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T05:43:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5606"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T05:43:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5606"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021:0799
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for RHEL-8-CNV-2.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 2.6.0 images:\n\nRHEL-8-CNV-2.6\n==============\nkubevirt-cpu-node-labeller-container-v2.6.0-5\nkubevirt-cpu-model-nfd-plugin-container-v2.6.0-5\nnode-maintenance-operator-container-v2.6.0-13\nkubevirt-vmware-container-v2.6.0-5\nvirtio-win-container-v2.6.0-5\nkubevirt-kvm-info-nfd-plugin-container-v2.6.0-5\nbridge-marker-container-v2.6.0-9\nkubevirt-template-validator-container-v2.6.0-9\nkubevirt-v2v-conversion-container-v2.6.0-6\nkubemacpool-container-v2.6.0-13\nkubevirt-ssp-operator-container-v2.6.0-40\nhyperconverged-cluster-webhook-container-v2.6.0-73\nhyperconverged-cluster-operator-container-v2.6.0-73\novs-cni-plugin-container-v2.6.0-10\ncnv-containernetworking-plugins-container-v2.6.0-10\novs-cni-marker-container-v2.6.0-10\ncluster-network-addons-operator-container-v2.6.0-16\nhostpath-provisioner-container-v2.6.0-11\nhostpath-provisioner-operator-container-v2.6.0-14\nvm-import-virtv2v-container-v2.6.0-21\nkubernetes-nmstate-handler-container-v2.6.0-19\nvm-import-controller-container-v2.6.0-21\nvm-import-operator-container-v2.6.0-21\nvirt-api-container-v2.6.0-111\nvirt-controller-container-v2.6.0-111\nvirt-handler-container-v2.6.0-111\nvirt-operator-container-v2.6.0-111\nvirt-launcher-container-v2.6.0-111\ncnv-must-gather-container-v2.6.0-54\nvirt-cdi-importer-container-v2.6.0-24\nvirt-cdi-cloner-container-v2.6.0-24\nvirt-cdi-controller-container-v2.6.0-24\nvirt-cdi-uploadserver-container-v2.6.0-24\nvirt-cdi-apiserver-container-v2.6.0-24\nvirt-cdi-uploadproxy-container-v2.6.0-24\nvirt-cdi-operator-container-v2.6.0-24\nhco-bundle-registry-container-v2.6.0-582\n\nSecurity Fix(es):\n\n* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)\n\n* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)\n\n* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\n* containernetworking-cni: Arbitrary path injection via type field in CNI configuration (CVE-2021-20206)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0799",
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1732329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732329"
},
{
"category": "external",
"summary": "1783192",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783192"
},
{
"category": "external",
"summary": "1791753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791753"
},
{
"category": "external",
"summary": "1804533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533"
},
{
"category": "external",
"summary": "1848954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848954"
},
{
"category": "external",
"summary": "1848956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848956"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1853911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853911"
},
{
"category": "external",
"summary": "1854098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854098"
},
{
"category": "external",
"summary": "1856347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856347"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1859235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859235"
},
{
"category": "external",
"summary": "1860714",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860714"
},
{
"category": "external",
"summary": "1860992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860992"
},
{
"category": "external",
"summary": "1864577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1864577"
},
{
"category": "external",
"summary": "1866593",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1866593"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1868817",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868817"
},
{
"category": "external",
"summary": "1873771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873771"
},
{
"category": "external",
"summary": "1874812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874812"
},
{
"category": "external",
"summary": "1878499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878499"
},
{
"category": "external",
"summary": "1879108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879108"
},
{
"category": "external",
"summary": "1881874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881874"
},
{
"category": "external",
"summary": "1883232",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883232"
},
{
"category": "external",
"summary": "1883371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371"
},
{
"category": "external",
"summary": "1885153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885153"
},
{
"category": "external",
"summary": "1885418",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885418"
},
{
"category": "external",
"summary": "1887398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887398"
},
{
"category": "external",
"summary": "1889295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889295"
},
{
"category": "external",
"summary": "1891285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891285"
},
{
"category": "external",
"summary": "1891440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891440"
},
{
"category": "external",
"summary": "1892227",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892227"
},
{
"category": "external",
"summary": "1893278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893278"
},
{
"category": "external",
"summary": "1893646",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893646"
},
{
"category": "external",
"summary": "1894428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894428"
},
{
"category": "external",
"summary": "1894824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894824"
},
{
"category": "external",
"summary": "1894897",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894897"
},
{
"category": "external",
"summary": "1895414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895414"
},
{
"category": "external",
"summary": "1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "1898072",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898072"
},
{
"category": "external",
"summary": "1898840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898840"
},
{
"category": "external",
"summary": "1899558",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899558"
},
{
"category": "external",
"summary": "1901480",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901480"
},
{
"category": "external",
"summary": "1902046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902046"
},
{
"category": "external",
"summary": "1902111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111"
},
{
"category": "external",
"summary": "1903014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903014"
},
{
"category": "external",
"summary": "1903585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903585"
},
{
"category": "external",
"summary": "1904797",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904797"
},
{
"category": "external",
"summary": "1907151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907151"
},
{
"category": "external",
"summary": "1907352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907352"
},
{
"category": "external",
"summary": "1907691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907691"
},
{
"category": "external",
"summary": "1907988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907988"
},
{
"category": "external",
"summary": "1908363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908363"
},
{
"category": "external",
"summary": "1908421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908421"
},
{
"category": "external",
"summary": "1908883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883"
},
{
"category": "external",
"summary": "1909458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909458"
},
{
"category": "external",
"summary": "1910857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910857"
},
{
"category": "external",
"summary": "1911118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911118"
},
{
"category": "external",
"summary": "1911396",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911396"
},
{
"category": "external",
"summary": "1911662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911662"
},
{
"category": "external",
"summary": "1912908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912908"
},
{
"category": "external",
"summary": "1913248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913248"
},
{
"category": "external",
"summary": "1913320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913320"
},
{
"category": "external",
"summary": "1913717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913717"
},
{
"category": "external",
"summary": "1913756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913756"
},
{
"category": "external",
"summary": "1914177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914177"
},
{
"category": "external",
"summary": "1914608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914608"
},
{
"category": "external",
"summary": "1914947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914947"
},
{
"category": "external",
"summary": "1917908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917908"
},
{
"category": "external",
"summary": "1917963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917963"
},
{
"category": "external",
"summary": "1919391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391"
},
{
"category": "external",
"summary": "1920576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920576"
},
{
"category": "external",
"summary": "1920610",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920610"
},
{
"category": "external",
"summary": "1921650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650"
},
{
"category": "external",
"summary": "1923979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923979"
},
{
"category": "external",
"summary": "1927373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927373"
},
{
"category": "external",
"summary": "1906199",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906199"
},
{
"category": "external",
"summary": "1931376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931376"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0799.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 2.6.0 security and bug fix update",
"tracking": {
"current_release_date": "2025-11-07T15:52:02+00:00",
"generator": {
"date": "2025-11-07T15:52:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:0799",
"initial_release_date": "2021-03-10T11:41:12+00:00",
"revision_history": [
{
"date": "2021-03-10T11:41:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-03-10T11:41:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T15:52:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 2.6 for RHEL 8",
"product": {
"name": "CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-model-nfd-plugin\u0026tag=v2.6.0-9"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-node-labeller\u0026tag=v2.6.0-7"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"product_id": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-kvm-info-nfd-plugin\u0026tag=v2.6.0-7"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v2.6.0-25"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product_id": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller\u0026tag=v2.6.0-25"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-9283",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2020-02-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1804533"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the SSH package of the golang.org/x/crypto library. An attacker could exploit this flaw by supplying crafted SSH ed25519 keys to cause a crash in applications that use this package as either an SSH client or server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform uses the vulnerable library in a number of components but strictly as an SSH client. The severity of this vulnerability is reduced for clients as it requires connections to malicious SSH servers, with the maximum impact only a client crash. This vulnerability is rated Low for OpenShift Container Platform.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9283"
},
{
"category": "external",
"summary": "RHBZ#1804533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9283",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9283"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY",
"url": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY"
}
],
"release_date": "2020-02-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic"
},
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-26160",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2020-09-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1883371"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in jwt-go where it is vulnerable to Access Restriction Bypass if m[\"aud\"] happens to be []string{}, as allowed by the spec, the type assertion fails and the value of aud is \"\". This can cause audience verification to succeed even if the audiences being passed are incorrect if required is set to false.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jwt-go: access restriction bypass vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The github.com/dgrijalva/jwt-go module is an indirect dependency of the k8s.io/client-go module pulled into Quay Bridge, and Setup operators via the Operator\u0027s SDK generated code. The k8s.io/client-go module does not use jwt-go in an unsafe way [1]. Red Hat Quay components have been marked as wontfix. This may be fixed in the future.\n\nSimilar to Quay, multiple OpenShift Container Platform (OCP) containers include jwt-go as a transient dependency due to go-autorest [1]. As such, those containers do not use jwt-go in an unsafe way. They have been marked wontfix at this time and may be fixed in a future update.\n\nSame as Quay and OpenShift Container Platform, components shipped with Red Hat OpenShift Container Storage 4 do not use jwt-go in an unsafe way and hence this issue has been rated as having a security impact of Low. A future update may address this issue.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli as a technical preview and is not currently planned to be addressed in future updates, hence the multi-cloud-object-gateway-cli package will not be fixed.\n\n[1] https://github.com/Azure/go-autorest/issues/568#issuecomment-703804062",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26160"
},
{
"category": "external",
"summary": "RHBZ#1883371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26160",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26160"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515",
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jwt-go: access restriction bypass vulnerability"
},
{
"cve": "CVE-2020-27813",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-11-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902111"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker could use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang-github-gorilla-websocket: integer overflow leads to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27813"
},
{
"category": "external",
"summary": "RHBZ#1902111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27813",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27813"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813"
},
{
"category": "external",
"summary": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh",
"url": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh"
}
],
"release_date": "2019-08-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang-github-gorilla-websocket: integer overflow leads to denial of service"
},
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
},
{
"cve": "CVE-2020-29652",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908883"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference vulnerability was found in golang. When using the library\u0027s ssh server without specifying an option for GSSAPIWithMICConfig, it is possible for an attacker to craft an ssh client connection using the `gssapi-with-mic` authentication method and cause the server to panic resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A large number of products include the affected package, but do not make use of the vulnerable SSH server code. Accordingly, the flaw itself is rated as \"Important\", but these products themselves all have a \"Low\" severity rating.\n\nAdditionally, a number of products include golang.org/x/crypto (or even golang.org/x/crypto/ssh/terminal) but not specifically golang.org/x/crypto/ssh/server.go in the final build. As this would result in a very large number of entries of not affected products, only products which include the ssh server code (golang.org/x/crypto/ssh/server.go) have been represented here. \n\nRed Hat Enterprise Linux 8 container-tools:rhel8/containernetworking-plugins is not affected because although it uses some functionality from golang.org/x/crypto, it does not use or import anything from golang.org/x/crypto/ssh/*.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29652"
},
{
"category": "external",
"summary": "RHBZ#1908883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29652",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29652"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1"
}
],
"release_date": "2020-12-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference"
},
{
"cve": "CVE-2021-3121",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921650"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3121"
},
{
"category": "external",
"summary": "RHBZ#1921650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121"
}
],
"release_date": "2021-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation"
},
{
"acknowledgments": [
{
"names": [
"Casey Callendrello"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-20206",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2021-01-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919391"
}
],
"notes": [
{
"category": "description",
"text": "An improper limitation of path name flaw was found in containernetworking/cni. When specifying the plugin to load in the `type` field in the network configuration, it is possible to use special elements such as \"../\" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as `reboot`. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "containernetworking-cni: Arbitrary path injection via type field in CNI configuration",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) does package a vulnerable version of containernetworking/cni, however, the NetworkDefinitionAttachment is defined in code and cannot be easily changed except through a user who has access to the operator namespace such as cluster-admin. As such, for OSSM, the impact is Moderate.\n\nThe fix for podman was released as a part of OpenShift 4.8 and is included in future releases.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20206"
},
{
"category": "external",
"summary": "RHBZ#1919391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20206",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20206"
}
],
"release_date": "2021-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "containernetworking-cni: Arbitrary path injection via type field in CNI configuration"
}
]
}
RHBA-2020:5123
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.4.31 is now available with updates to packages and images that fix several bugs.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.4.31. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2020:5122\n\nAll OpenShift Container Platform 4.4 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:5123",
"url": "https://access.redhat.com/errata/RHBA-2020:5123"
},
{
"category": "external",
"summary": "1897975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897975"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_5123.json"
}
],
"title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.4.31 packages update",
"tracking": {
"current_release_date": "2025-11-06T23:51:27+00:00",
"generator": {
"date": "2025-11-06T23:51:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHBA-2020:5123",
"initial_release_date": "2020-12-02T16:36:58+00:00",
"revision_history": [
{
"date": "2020-12-02T16:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-02T16:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:51:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.4",
"product": {
"name": "Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.4",
"product": {
"name": "Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.4::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "iptables-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-arptables@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-devel@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-ebtables@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-libs@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-services@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-utils@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-debugsource@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-debuginfo@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-libs-debuginfo@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-utils-debuginfo@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.4.0-202011122017.p0.git.3445.6937a03.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.x86_64",
"product": {
"name": "faq-0:0.0.6-5.el7.x86_64",
"product_id": "faq-0:0.0.6-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "iptables-0:1.8.4-10.el8_2.4.src",
"product": {
"name": "iptables-0:1.8.4-10.el8_2.4.src",
"product_id": "iptables-0:1.8.4-10.el8_2.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables@1.8.4-10.el8_2.4?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"product": {
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"product_id": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.4.0-202011130111.p0.git.0.4861dfa.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.src",
"product": {
"name": "faq-0:0.0.6-5.el7.src",
"product_id": "faq-0:0.0.6-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"product": {
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"product_id": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"product": {
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"product_id": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.4.0-202011122017.p0.git.0.2755c9b.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.ppc64le",
"product": {
"name": "faq-0:0.0.6-5.el7.ppc64le",
"product_id": "faq-0:0.0.6-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.s390x",
"product": {
"name": "faq-0:0.0.6-5.el7.s390x",
"product_id": "faq-0:0.0.6-5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product_id": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.4.0-202011122017.p0.git.0.2755c9b.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product_id": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.4.0-202011122017.p0.git.0.2755c9b.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le"
},
"product_reference": "faq-0:0.0.6-5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x"
},
"product_reference": "faq-0:0.0.6-5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src"
},
"product_reference": "faq-0:0.0.6-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64"
},
"product_reference": "faq-0:0.0.6-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src"
},
"product_reference": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src"
},
"product_reference": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-0:1.8.4-10.el8_2.4.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src"
},
"product_reference": "iptables-0:1.8.4-10.el8_2.4.src",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-services-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src"
},
"product_reference": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-02T16:36:58+00:00",
"details": "For OpenShift Container Platform 4.4 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:5123"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-02T16:36:58+00:00",
"details": "For OpenShift Container Platform 4.4 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:5123"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHBA-2020:4197
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.6.1 is now available with\nupdates to packages and images that fix several bugs and add enhancements.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat\nOpenShift Container Platform 4.6.1. See the following advisory for the\ncontainer images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2020:4196\n\nSpace precludes documenting all of the bug fixes and enhancements in this\nadvisory, as well as all of the container images in this advisory. See the\nfollowing Release Notes documentation, which will be updated shortly for\nthis release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:4197",
"url": "https://access.redhat.com/errata/RHBA-2020:4197"
},
{
"category": "external",
"summary": "1834410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834410"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_4197.json"
}
],
"title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6 GA RPMs",
"tracking": {
"current_release_date": "2025-11-06T23:51:27+00:00",
"generator": {
"date": "2025-11-06T23:51:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHBA-2020:4197",
"initial_release_date": "2020-10-27T14:47:06+00:00",
"revision_history": [
{
"date": "2020-10-27T14:47:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-27T14:47:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:51:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"product": {
"name": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"product_id": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl100-firmware@39.31.5.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"product": {
"name": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"product_id": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl1000-firmware@39.31.5.1-98.el8.1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl105-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl135-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl2000-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl2030-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"product": {
"name": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"product_id": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl3160-firmware@25.30.13.0-98.el8.1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"product": {
"name": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"product_id": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl3945-firmware@15.32.2.9-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"product": {
"name": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"product_id": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl4965-firmware@228.61.2.24-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"product": {
"name": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"product_id": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl5000-firmware@8.83.5.1_1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"product": {
"name": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"product_id": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl5150-firmware@8.24.2.2-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"product": {
"name": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"product_id": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6000-firmware@9.221.4.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6000g2a-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6000g2b-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"product": {
"name": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"product_id": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6050-firmware@41.28.5.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"product": {
"name": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"product_id": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl7260-firmware@25.30.13.0-98.el8.1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libertas-sd8686-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libertas-sd8787-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libertas-usb8388-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libertas-usb8388-olpc-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/linux-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pprof-0:2.6.3-2.el8+7.noarch",
"product": {
"name": "pprof-0:2.6.3-2.el8+7.noarch",
"product_id": "pprof-0:2.6.3-2.el8+7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pprof@2.6.3-2.el8%2B7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product": {
"name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_id": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kuryr-binding-scripts@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product": {
"name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_id": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-lib@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product": {
"name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_id": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-lib-tests@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"product": {
"name": "python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"product_id": "python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-pyroute2@0.5.3-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "protobuf-vim-0:3.6.1-4.el8ost.noarch",
"product": {
"name": "protobuf-vim-0:3.6.1-4.el8ost.noarch",
"product_id": "protobuf-vim-0:3.6.1-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-vim@3.6.1-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-protobuf-0:3.6.1-4.el8ost.noarch",
"product": {
"name": "python3-protobuf-0:3.6.1-4.el8ost.noarch",
"product_id": "python3-protobuf-0:3.6.1-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-protobuf@3.6.1-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"product": {
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"product_id": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhcos-tools@0.0.0-1.rhaos4.2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"product": {
"name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"product_id": "ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-http@1.0.0-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"product": {
"name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"product_id": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-requests-unixsocket@0.1.5-5.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"product": {
"name": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"product_id": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ironic-lib@4.3.0-0.20200605221931.df238ba.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product": {
"name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product_id": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openstacksdk@0.48.0-0.20200708092906.3b693c2.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product": {
"name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product_id": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openstacksdk-tests@0.48.0-0.20200708092906.3b693c2.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"product": {
"name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"product_id": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keystoneauth1@4.2.0-0.20200630234358.dab8e10.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"product": {
"name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"product_id": "python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-zeroconf@0.24.4-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"product": {
"name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"product_id": "python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ifaddr@0.1.6-5.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-construct-0:2.10.56-1.el8ost.noarch",
"product": {
"name": "python3-construct-0:2.10.56-1.el8ost.noarch",
"product_id": "python3-construct-0:2.10.56-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-construct@2.10.56-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kubernetes-0:11.0.0-1.el8.noarch",
"product": {
"name": "python3-kubernetes-0:11.0.0-1.el8.noarch",
"product_id": "python3-kubernetes-0:11.0.0-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kubernetes@11.0.0-1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"product": {
"name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"product_id": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kubernetes-tests@11.0.0-1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-openshift-1:0.11.2-1.el8.noarch",
"product": {
"name": "python3-openshift-1:0.11.2-1.el8.noarch",
"product_id": "python3-openshift-1:0.11.2-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openshift@0.11.2-1.el8?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_id": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/octavia-amphora-image-x86_64@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-all@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-ipa@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-ipa-ppc64le@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-ipa-x86_64@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-minimal@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-ppc64le@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-x86_64@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"product": {
"name": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"product_id": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-config-connectivity-redhat@1.22.8-6.el8_2?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"product": {
"name": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"product_id": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-config-server@1.22.8-6.el8_2?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"product": {
"name": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"product_id": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-dispatcher-routing-rules@1.22.8-6.el8_2?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-pexpect-0:4.6-2.el8ar.noarch",
"product": {
"name": "python3-pexpect-0:4.6-2.el8ar.noarch",
"product_id": "python3-pexpect-0:4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-pexpect@4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-lockfile-1:0.11.0-8.el8ar.noarch",
"product": {
"name": "python3-lockfile-1:0.11.0-8.el8ar.noarch",
"product_id": "python3-lockfile-1:0.11.0-8.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lockfile@0.11.0-8.el8ar?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-daemon-0:2.1.2-9.el8ar.noarch",
"product": {
"name": "python3-daemon-0:2.1.2-9.el8ar.noarch",
"product_id": "python3-daemon-0:2.1.2-9.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-daemon@2.1.2-9.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"product": {
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"product_id": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.8-1.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"product": {
"name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"product_id": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tooz@2.7.0-0.20200723133754.fca43df.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-rsa-0:4.6-1.el8.noarch",
"product": {
"name": "python3-rsa-0:4.6-1.el8.noarch",
"product_id": "python3-rsa-0:4.6-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rsa@4.6-1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product": {
"name": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_id": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-oslo-concurrency-lang@4.2.0-0.20200708091908.35e4df4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product": {
"name": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_id": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-oslo-concurrency@4.2.0-0.20200708091908.35e4df4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product": {
"name": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_id": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-oslo-concurrency-tests@4.2.0-0.20200708091908.35e4df4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector-api@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector-conductor@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector-dnsmasq@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ironic-inspector-tests@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-flask-doc-1:1.1.1-1.el8ost.noarch",
"product": {
"name": "python-flask-doc-1:1.1.1-1.el8ost.noarch",
"product_id": "python-flask-doc-1:1.1.1-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-flask-doc@1.1.1-1.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-flask-1:1.1.1-1.el8ost.noarch",
"product": {
"name": "python3-flask-1:1.1.1-1.el8ost.noarch",
"product_id": "python3-flask-1:1.1.1-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-flask@1.1.1-1.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"product": {
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"product_id": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.144.0-1.rhaos4.6.el8?arch=noarch\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python3-pbr-0:5.4.3-2.el8ost.noarch",
"product": {
"name": "python3-pbr-0:5.4.3-2.el8ost.noarch",
"product_id": "python3-pbr-0:5.4.3-2.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-pbr@5.4.3-2.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product": {
"name": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product_id": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-sushy@3.3.0-0.20200804091926.0dfe74a.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product": {
"name": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product_id": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-sushy-tests@3.3.0-0.20200804091926.0dfe74a.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"product": {
"name": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"product_id": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-test@2.13.0-52.el8fdp?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"product": {
"name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"product_id": "python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-websocket-client@0.54.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-string_utils-0:0.6.0-4.el8ost.noarch",
"product": {
"name": "python3-string_utils-0:0.6.0-4.el8ost.noarch",
"product_id": "python3-string_utils-0:0.6.0-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-string_utils@0.6.0-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-google-auth-0:1.3.0-1.el8ost.noarch",
"product": {
"name": "python3-google-auth-0:1.3.0-1.el8ost.noarch",
"product_id": "python3-google-auth-0:1.3.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-google-auth@1.3.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"product": {
"name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"product_id": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-dictdiffer@0.7.1-2.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-certifi-0:2018.10.15-4.el8ost.noarch",
"product": {
"name": "python3-certifi-0:2018.10.15-4.el8ost.noarch",
"product_id": "python3-certifi-0:2018.10.15-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-certifi@2018.10.15-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-cachetools-0:3.1.0-1.el8ost.noarch",
"product": {
"name": "python2-cachetools-0:3.1.0-1.el8ost.noarch",
"product_id": "python2-cachetools-0:3.1.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-cachetools@3.1.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-cachetools-0:3.1.0-1.el8ost.noarch",
"product": {
"name": "python3-cachetools-0:3.1.0-1.el8ost.noarch",
"product_id": "python3-cachetools-0:3.1.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-cachetools@3.1.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"product": {
"name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"product_id": "python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-s3transfer@0.2.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-boto3-0:1.9.101-1.el8ost.noarch",
"product": {
"name": "python3-boto3-0:1.9.101-1.el8ost.noarch",
"product_id": "python3-boto3-0:1.9.101-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-boto3@1.9.101-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-botocore-0:1.12.119-1.el8ost.noarch",
"product": {
"name": "python2-botocore-0:1.12.119-1.el8ost.noarch",
"product_id": "python2-botocore-0:1.12.119-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-botocore@1.12.119-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-botocore-0:1.12.119-1.el8ost.noarch",
"product": {
"name": "python3-botocore-0:1.12.119-1.el8ost.noarch",
"product_id": "python3-botocore-0:1.12.119-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-botocore@1.12.119-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-0:2.235.5.1600670743-1.el8.noarch",
"product": {
"name": "jenkins-0:2.235.5.1600670743-1.el8.noarch",
"product_id": "jenkins-0:2.235.5.1600670743-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.235.5.1600670743-1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product": {
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product_id": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-python-agent@6.3.1-0.20200918042952.9dd968f.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product": {
"name": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product_id": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ironic-python-agent@6.3.1-0.20200918042952.9dd968f.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-tenacity-0:6.2.0-1.el8ost.noarch",
"product": {
"name": "python3-tenacity-0:6.2.0-1.el8ost.noarch",
"product_id": "python3-tenacity-0:6.2.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tenacity@6.2.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"product": {
"name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"product_id": "python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-werkzeug@1.0.1-3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product": {
"name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product_id": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-sushy-oem-idrac@0.0.3-0.20200922221223.1202372.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product": {
"name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product_id": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-sushy-oem-idrac-tests@0.0.3-0.20200922221223.1202372.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product": {
"name": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_id": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-api@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product": {
"name": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_id": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-common@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product": {
"name": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_id": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-conductor@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product": {
"name": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_id": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ironic-tests@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product": {
"name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_id": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-oslo-db-lang@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product": {
"name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_id": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-oslo-db@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product": {
"name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_id": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-oslo-db-tests@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-alembic-0:1.4.2-5.el8ost.noarch",
"product": {
"name": "python3-alembic-0:1.4.2-5.el8ost.noarch",
"product_id": "python3-alembic-0:1.4.2-5.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-alembic@1.4.2-5.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.24.1.el8_2.dt1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_id": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.24.1.el8_2.dt1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"product": {
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"product_id": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/console-login-helper-messages@0.19-3.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"product": {
"name": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"product_id": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/console-login-helper-messages-issuegen@0.19-3.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"product": {
"name": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"product_id": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/console-login-helper-messages-profile@0.19-3.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-boto3-0:1.4.0-1.el7.noarch",
"product": {
"name": "python2-boto3-0:1.4.0-1.el7.noarch",
"product_id": "python2-boto3-0:1.4.0-1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-boto3@1.4.0-1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-botocore-0:1.4.57-5.el7.noarch",
"product": {
"name": "python2-botocore-0:1.4.57-5.el7.noarch",
"product_id": "python2-botocore-0:1.4.57-5.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-botocore@1.4.57-5.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-s3transfer-0:0.1.3-1.el7.noarch",
"product": {
"name": "python2-s3transfer-0:0.1.3-1.el7.noarch",
"product_id": "python2-s3transfer-0:0.1.3-1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-s3transfer@0.1.3-1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product_id": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202010011112.p0.git.0.f35f5eb.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product_id": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.6.0-202010011112.p0.git.0.f35f5eb.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"product": {
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"product_id": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/linux-firmware@20200512-98.gitb2cad6a2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "libunwind-0:1.2.1-5.el8.src",
"product": {
"name": "libunwind-0:1.2.1-5.el8.src",
"product_id": "libunwind-0:1.2.1-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "libnftnl-0:1.1.5-4.el8.src",
"product": {
"name": "libnftnl-0:1.1.5-4.el8.src",
"product_id": "libnftnl-0:1.1.5-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "gperftools-0:2.6.3-2.el8+7.src",
"product": {
"name": "gperftools-0:2.6.3-2.el8+7.src",
"product_id": "gperftools-0:2.6.3-2.el8+7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=src"
}
}
},
{
"category": "product_version",
"name": "libsodium-0:1.0.16-4.5.el8ost.src",
"product": {
"name": "libsodium-0:1.0.16-4.5.el8ost.src",
"product_id": "libsodium-0:1.0.16-4.5.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"product": {
"name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"product_id": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-kuryr-lib@1.1.1-0.20190923160834.41e6964.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.src",
"product": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.src",
"product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pyroute2-0:0.5.3-4.el8ost.src",
"product": {
"name": "python-pyroute2-0:0.5.3-4.el8ost.src",
"product_id": "python-pyroute2-0:0.5.3-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pyroute2@0.5.3-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el8.src",
"product": {
"name": "cri-tools-0:1.18.0-3.el8.src",
"product_id": "cri-tools-0:1.18.0-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "protobuf-0:3.6.1-4.el8ost.src",
"product": {
"name": "protobuf-0:3.6.1-4.el8ost.src",
"product_id": "protobuf-0:3.6.1-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"product": {
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"product_id": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhcos-tools@0.0.0-1.rhaos4.2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "grpc-0:1.18.0-4.el8ost.src",
"product": {
"name": "grpc-0:1.18.0-4.el8ost.src",
"product_id": "grpc-0:1.18.0-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"product": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "dracut-0:049-75.git20200422.el8.src",
"product": {
"name": "dracut-0:049-75.git20200422.el8.src",
"product_id": "dracut-0:049-75.git20200422.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:46.82-2.el8.src",
"product": {
"name": "redhat-release-coreos-0:46.82-2.el8.src",
"product_id": "redhat-release-coreos-0:46.82-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"product": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-4.el8.src",
"product": {
"name": "faq-0:0.0.6-4.el8.src",
"product_id": "faq-0:0.0.6-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el8.src",
"product": {
"name": "jq-0:1.6-2.el8.src",
"product_id": "jq-0:1.6-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.1.1c-15.el8.src",
"product": {
"name": "openssl-1:1.1.1c-15.el8.src",
"product_id": "openssl-1:1.1.1c-15.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tini-0:0.16.1-1.el8ar.src",
"product": {
"name": "tini-0:0.16.1-1.el8ar.src",
"product_id": "tini-0:0.16.1-1.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-psutil-0:5.6.6-1.el8ar.src",
"product": {
"name": "python-psutil-0:5.6.6-1.el8ar.src",
"product_id": "python-psutil-0:5.6.6-1.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil@5.6.6-1.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-http-0:1.0.0-2.el8ar.src",
"product": {
"name": "ansible-runner-http-0:1.0.0-2.el8ar.src",
"product_id": "ansible-runner-http-0:1.0.0-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-http@1.0.0-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"product": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-0:3.20.1-2.el8.src",
"product": {
"name": "inotify-tools-0:3.20.1-2.el8.src",
"product_id": "inotify-tools-0:3.20.1-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"product": {
"name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"product_id": "python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests-unixsocket@0.1.5-5.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"product": {
"name": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"product_id": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ironic-lib@4.3.0-0.20200605221931.df238ba.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"product": {
"name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"product_id": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-openstacksdk@0.48.0-0.20200708092906.3b693c2.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"product": {
"name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"product_id": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-keystoneauth1@4.2.0-0.20200630234358.dab8e10.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-zeroconf-0:0.24.4-1.el8ost.src",
"product": {
"name": "python-zeroconf-0:0.24.4-1.el8ost.src",
"product_id": "python-zeroconf-0:0.24.4-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-zeroconf@0.24.4-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-ifaddr-0:0.1.6-5.el8ost.src",
"product": {
"name": "python-ifaddr-0:0.1.6-5.el8ost.src",
"product_id": "python-ifaddr-0:0.1.6-5.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ifaddr@0.1.6-5.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-construct-0:2.10.56-1.el8ost.src",
"product": {
"name": "python-construct-0:2.10.56-1.el8ost.src",
"product_id": "python-construct-0:2.10.56-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-construct@2.10.56-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-kubernetes-0:11.0.0-1.el8.src",
"product": {
"name": "python-kubernetes-0:11.0.0-1.el8.src",
"product_id": "python-kubernetes-0:11.0.0-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-kubernetes@11.0.0-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-openshift-1:0.11.2-1.el8.src",
"product": {
"name": "python-openshift-1:0.11.2-1.el8.src",
"product_id": "python-openshift-1:0.11.2-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-openshift@0.11.2-1.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"product": {
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"product_id": "rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images@17.0-20200606.1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-1:1.22.8-6.el8_2.src",
"product": {
"name": "NetworkManager-1:1.22.8-6.el8_2.src",
"product_id": "NetworkManager-1:1.22.8-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "haproxy-0:2.0.16-3.el8.src",
"product": {
"name": "haproxy-0:2.0.16-3.el8.src",
"product_id": "haproxy-0:2.0.16-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy@2.0.16-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pexpect-0:4.6-2.el8ar.src",
"product": {
"name": "python-pexpect-0:4.6-2.el8ar.src",
"product_id": "python-pexpect-0:4.6-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pexpect@4.6-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-lockfile-1:0.11.0-8.el8ar.src",
"product": {
"name": "python-lockfile-1:0.11.0-8.el8ar.src",
"product_id": "python-lockfile-1:0.11.0-8.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lockfile@0.11.0-8.el8ar?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-daemon-0:2.1.2-9.el8ar.src",
"product": {
"name": "python-daemon-0:2.1.2-9.el8ar.src",
"product_id": "python-daemon-0:2.1.2-9.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-daemon@2.1.2-9.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.src",
"product": {
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.src",
"product_id": "toolbox-0:0.0.8-1.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.8-1.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"product": {
"name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"product_id": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-tooz@2.7.0-0.20200723133754.fca43df.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-rsa-0:4.6-1.el8.src",
"product": {
"name": "python-rsa-0:4.6-1.el8.src",
"product_id": "python-rsa-0:4.6-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-rsa@4.6-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"product": {
"name": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"product_id": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-oslo-concurrency@4.2.0-0.20200708091908.35e4df4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-0:2020.4-1.el8.src",
"product": {
"name": "rpm-ostree-0:2020.4-1.el8.src",
"product_id": "rpm-ostree-0:2020.4-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"product": {
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"product_id": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-flask-1:1.1.1-1.el8ost.src",
"product": {
"name": "python-flask-1:1.1.1-1.el8ost.src",
"product_id": "python-flask-1:1.1.1-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-flask@1.1.1-1.el8ost?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"product": {
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"product_id": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.144.0-1.rhaos4.6.el8?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python-pbr-0:5.4.3-2.el8ost.src",
"product": {
"name": "python-pbr-0:5.4.3-2.el8ost.src",
"product_id": "python-pbr-0:5.4.3-2.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pbr@5.4.3-2.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"product": {
"name": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"product_id": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sushy@3.3.0-0.20200804091926.0dfe74a.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.src",
"product": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.src",
"product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-websocket-client-0:0.54.0-1.el8ost.src",
"product": {
"name": "python-websocket-client-0:0.54.0-1.el8ost.src",
"product_id": "python-websocket-client-0:0.54.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-websocket-client@0.54.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-string_utils-0:0.6.0-4.el8ost.src",
"product": {
"name": "python-string_utils-0:0.6.0-4.el8ost.src",
"product_id": "python-string_utils-0:0.6.0-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-string_utils@0.6.0-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"product": {
"name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"product_id": "python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ruamel-yaml@0.15.41-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-google-auth-0:1.3.0-1.el8ost.src",
"product": {
"name": "python-google-auth-0:1.3.0-1.el8ost.src",
"product_id": "python-google-auth-0:1.3.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-google-auth@1.3.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-dictdiffer-0:0.7.1-2.el8ost.src",
"product": {
"name": "python-dictdiffer-0:0.7.1-2.el8ost.src",
"product_id": "python-dictdiffer-0:0.7.1-2.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-dictdiffer@0.7.1-2.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-certifi-0:2018.10.15-4.el8ost.src",
"product": {
"name": "python-certifi-0:2018.10.15-4.el8ost.src",
"product_id": "python-certifi-0:2018.10.15-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-certifi@2018.10.15-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-cachetools-0:3.1.0-1.el8ost.src",
"product": {
"name": "python-cachetools-0:3.1.0-1.el8ost.src",
"product_id": "python-cachetools-0:3.1.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cachetools@3.1.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-s3transfer-0:0.2.0-1.el8ost.src",
"product": {
"name": "python-s3transfer-0:0.2.0-1.el8ost.src",
"product_id": "python-s3transfer-0:0.2.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-s3transfer@0.2.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-boto3-0:1.9.101-1.el8ost.src",
"product": {
"name": "python-boto3-0:1.9.101-1.el8ost.src",
"product_id": "python-boto3-0:1.9.101-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-boto3@1.9.101-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-botocore-0:1.12.119-1.el8ost.src",
"product": {
"name": "python-botocore-0:1.12.119-1.el8ost.src",
"product_id": "python-botocore-0:1.12.119-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-botocore@1.12.119-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"product": {
"name": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"product_id": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rust-afterburn@4.5.0-2.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-0:2.235.5.1600670743-1.el8.src",
"product": {
"name": "jenkins-0:2.235.5.1600670743-1.el8.src",
"product_id": "jenkins-0:2.235.5.1600670743-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.235.5.1600670743-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"product": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"product": {
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"product_id": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-python-agent@6.3.1-0.20200918042952.9dd968f.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-tenacity-0:6.2.0-1.el8ost.src",
"product": {
"name": "python-tenacity-0:6.2.0-1.el8ost.src",
"product_id": "python-tenacity-0:6.2.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-tenacity@6.2.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-werkzeug-0:1.0.1-3.el8ost.src",
"product": {
"name": "python-werkzeug-0:1.0.1-3.el8ost.src",
"product_id": "python-werkzeug-0:1.0.1-3.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-werkzeug@1.0.1-3.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "ostree-0:2020.5-4.el8.src",
"product": {
"name": "ostree-0:2020.5-4.el8.src",
"product_id": "ostree-0:2020.5-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.src",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.src",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"product": {
"name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"product_id": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sushy-oem-idrac@0.0.3-0.20200922221223.1202372.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"product": {
"name": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"product_id": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"product": {
"name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"product_id": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-oslo-db@8.4.0-0.20200918104110.e42c733.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-alembic-0:1.4.2-5.el8ost.src",
"product": {
"name": "python-alembic-0:1.4.2-5.el8ost.src",
"product_id": "python-alembic-0:1.4.2-5.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-alembic@1.4.2-5.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"product": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"product": {
"name": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"product_id": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"product": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-0:20.09.0-1.el8fdp.src",
"product": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.src",
"product_id": "ovn2.13-0:20.09.0-1.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"product": {
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"product_id": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202010022112.p0.git.94033.ef41184.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"product": {
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"product_id": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/console-login-helper-messages@0.19-3.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-boto3-0:1.4.0-1.el7.src",
"product": {
"name": "python-boto3-0:1.4.0-1.el7.src",
"product_id": "python-boto3-0:1.4.0-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-boto3@1.4.0-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-botocore-0:1.4.57-5.el7.src",
"product": {
"name": "python-botocore-0:1.4.57-5.el7.src",
"product_id": "python-botocore-0:1.4.57-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-botocore@1.4.57-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el7.src",
"product": {
"name": "cri-tools-0:1.18.0-3.el7.src",
"product_id": "cri-tools-0:1.18.0-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "oniguruma-0:5.9.2-5.el7.src",
"product": {
"name": "oniguruma-0:5.9.2-5.el7.src",
"product_id": "oniguruma-0:5.9.2-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@5.9.2-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el7.src",
"product": {
"name": "jq-0:1.6-2.el7.src",
"product_id": "jq-0:1.6-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-s3transfer-0:0.1.3-1.el7.src",
"product": {
"name": "python-s3transfer-0:0.1.3-1.el7.src",
"product_id": "python-s3transfer-0:0.1.3-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-s3transfer@0.1.3-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.src",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.src",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el7?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"product": {
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"product_id": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202010011112.p0.git.0.f35f5eb.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"product": {
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"product_id": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-113.rhaos4.6.git97d715e.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"product": {
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"product_id": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202010022112.p0.git.94033.ef41184.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "s390utils-2:2.6.0-28.el8_2.2.src",
"product": {
"name": "s390utils-2:2.6.0-28.el8_2.2.src",
"product_id": "s390utils-2:2.6.0-28.el8_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils@2.6.0-28.el8_2.2?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libunwind-0:1.2.1-5.el8.ppc64le",
"product": {
"name": "libunwind-0:1.2.1-5.el8.ppc64le",
"product_id": "libunwind-0:1.2.1-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libunwind-devel-0:1.2.1-5.el8.ppc64le",
"product": {
"name": "libunwind-devel-0:1.2.1-5.el8.ppc64le",
"product_id": "libunwind-devel-0:1.2.1-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-devel@1.2.1-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"product": {
"name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"product_id": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-debugsource@1.2.1-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"product": {
"name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"product_id": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-debuginfo@1.2.1-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnftnl-0:1.1.5-4.el8.ppc64le",
"product": {
"name": "libnftnl-0:1.1.5-4.el8.ppc64le",
"product_id": "libnftnl-0:1.1.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"product": {
"name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"product_id": "libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"product": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"product_id": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"product": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el8.ppc64le",
"product": {
"name": "cri-tools-0:1.18.0-3.el8.ppc64le",
"product_id": "cri-tools-0:1.18.0-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"product_id": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"product_id": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"product_id": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_id": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debugsource@2.18.1-12.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_id": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debuginfo@2.18.1-12.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-caps-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-caps-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-live-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-live-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-live-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-live@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-network-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-network-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-squash-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-squash-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-squash-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-squash@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-tools-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-tools-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debugsource@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:46.82-2.el8.ppc64le",
"product": {
"name": "redhat-release-coreos-0:46.82-2.el8.ppc64le",
"product_id": "redhat-release-coreos-0:46.82-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"product": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-4.el8.ppc64le",
"product": {
"name": "faq-0:0.0.6-4.el8.ppc64le",
"product_id": "faq-0:0.0.6-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el8.ppc64le",
"product": {
"name": "jq-0:1.6-2.el8.ppc64le",
"product_id": "jq-0:1.6-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jq-devel-0:1.6-2.el8.ppc64le",
"product": {
"name": "jq-devel-0:1.6-2.el8.ppc64le",
"product_id": "jq-devel-0:1.6-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jq-debugsource-0:1.6-2.el8.ppc64le",
"product": {
"name": "jq-debugsource-0:1.6-2.el8.ppc64le",
"product_id": "jq-debugsource-0:1.6-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jq-debuginfo-0:1.6-2.el8.ppc64le",
"product": {
"name": "jq-debuginfo-0:1.6-2.el8.ppc64le",
"product_id": "jq-debuginfo-0:1.6-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-devel-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-libs-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-perl-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-static-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-static-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tini-0:0.16.1-1.el8ar.ppc64le",
"product": {
"name": "tini-0:0.16.1-1.el8ar.ppc64le",
"product_id": "tini-0:0.16.1-1.el8ar.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"product": {
"name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"product_id": "python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"product": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"product": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-0:3.20.1-2.el8.ppc64le",
"product": {
"name": "inotify-tools-0:3.20.1-2.el8.ppc64le",
"product_id": "inotify-tools-0:3.20.1-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"product": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"product_id": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"product": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"product": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "haproxy20-0:2.0.16-3.el8.ppc64le",
"product": {
"name": "haproxy20-0:2.0.16-3.el8.ppc64le",
"product_id": "haproxy20-0:2.0.16-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20@2.0.16-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"product": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"product_id": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.16-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"product": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"product_id": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.16-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"product": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"product": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"product": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_id": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn@4.5.0-2.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_id": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.5.0-2.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_id": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn-debuginfo@4.5.0-2.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-devel-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-devel-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-devel-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-devel@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-grub2-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-grub2-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-grub2-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-grub2@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-libs-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-libs-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-debugsource-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-debugsource-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-debugsource-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debugsource@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debuginfo@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.0-20.rhaos4.6.git97d715e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-20.rhaos4.6.git97d715e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-1.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libunwind-0:1.2.1-5.el8.x86_64",
"product": {
"name": "libunwind-0:1.2.1-5.el8.x86_64",
"product_id": "libunwind-0:1.2.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libunwind-devel-0:1.2.1-5.el8.x86_64",
"product": {
"name": "libunwind-devel-0:1.2.1-5.el8.x86_64",
"product_id": "libunwind-devel-0:1.2.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-devel@1.2.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"product": {
"name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"product_id": "libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-debugsource@1.2.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"product": {
"name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"product_id": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-debuginfo@1.2.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnftnl-0:1.1.5-4.el8.x86_64",
"product": {
"name": "libnftnl-0:1.1.5-4.el8.x86_64",
"product_id": "libnftnl-0:1.1.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnftnl-devel-0:1.1.5-4.el8.x86_64",
"product": {
"name": "libnftnl-devel-0:1.1.5-4.el8.x86_64",
"product_id": "libnftnl-devel-0:1.1.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"product": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"product_id": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"product": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el8.x86_64",
"product": {
"name": "cri-tools-0:1.18.0-3.el8.x86_64",
"product_id": "cri-tools-0:1.18.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"product_id": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"product_id": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-static-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-static-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-static-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-cli-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-cli-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-devel-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-devel-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-devel-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"product_id": "python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_id": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debugsource@2.18.1-12.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_id": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debuginfo@2.18.1-12.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-caps-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-caps-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-live-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-live-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-live-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-live@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-network-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-network-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-squash-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-squash-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-squash-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-squash@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-tools-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-tools-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debugsource@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:46.82-2.el8.x86_64",
"product": {
"name": "redhat-release-coreos-0:46.82-2.el8.x86_64",
"product_id": "redhat-release-coreos-0:46.82-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"product": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-4.el8.x86_64",
"product": {
"name": "faq-0:0.0.6-4.el8.x86_64",
"product_id": "faq-0:0.0.6-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el8.x86_64",
"product": {
"name": "jq-0:1.6-2.el8.x86_64",
"product_id": "jq-0:1.6-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-devel-0:1.6-2.el8.x86_64",
"product": {
"name": "jq-devel-0:1.6-2.el8.x86_64",
"product_id": "jq-devel-0:1.6-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-debugsource-0:1.6-2.el8.x86_64",
"product": {
"name": "jq-debugsource-0:1.6-2.el8.x86_64",
"product_id": "jq-debugsource-0:1.6-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-debuginfo-0:1.6-2.el8.x86_64",
"product": {
"name": "jq-debuginfo-0:1.6-2.el8.x86_64",
"product_id": "jq-debuginfo-0:1.6-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-devel-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-libs-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-perl-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-static-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-static-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tini-0:0.16.1-1.el8ar.x86_64",
"product": {
"name": "tini-0:0.16.1-1.el8ar.x86_64",
"product_id": "tini-0:0.16.1-1.el8ar.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-0:5.6.6-1.el8ar.x86_64",
"product": {
"name": "python3-psutil-0:5.6.6-1.el8ar.x86_64",
"product_id": "python3-psutil-0:5.6.6-1.el8ar.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"product": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"product": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-0:3.20.1-2.el8.x86_64",
"product": {
"name": "inotify-tools-0:3.20.1-2.el8.x86_64",
"product_id": "inotify-tools-0:3.20.1-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"product": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"product_id": "inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"product": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"product": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "haproxy20-0:2.0.16-3.el8.x86_64",
"product": {
"name": "haproxy20-0:2.0.16-3.el8.x86_64",
"product_id": "haproxy20-0:2.0.16-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20@2.0.16-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"product": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"product_id": "haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.16-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"product": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"product_id": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.16-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_id": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"product_id": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_id": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"product_id": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product_id": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"product": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"product": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"product": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_id": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn@4.5.0-2.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_id": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.5.0-2.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_id": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn-debuginfo@4.5.0-2.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_id": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.6.0-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_id": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.6.0-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_id": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.6.0-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-0:2020.5-4.el8.x86_64",
"product_id": "ostree-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-devel-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-devel-0:2020.5-4.el8.x86_64",
"product_id": "ostree-devel-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-devel@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-grub2-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-grub2-0:2020.5-4.el8.x86_64",
"product_id": "ostree-grub2-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-grub2@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-libs-0:2020.5-4.el8.x86_64",
"product_id": "ostree-libs-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-debugsource-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-debugsource-0:2020.5-4.el8.x86_64",
"product_id": "ostree-debugsource-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debugsource@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-debuginfo-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-debuginfo-0:2020.5-4.el8.x86_64",
"product_id": "ostree-debuginfo-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debuginfo@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"product_id": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-selftests-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.0-20.rhaos4.6.git97d715e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-20.rhaos4.6.git97d715e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202010022112.p0.git.94033.ef41184.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el7.x86_64",
"product": {
"name": "cri-tools-0:1.18.0-3.el7.x86_64",
"product_id": "cri-tools-0:1.18.0-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"product_id": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-0:5.9.2-5.el7.x86_64",
"product": {
"name": "oniguruma-0:5.9.2-5.el7.x86_64",
"product_id": "oniguruma-0:5.9.2-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@5.9.2-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-devel-0:5.9.2-5.el7.x86_64",
"product": {
"name": "oniguruma-devel-0:5.9.2-5.el7.x86_64",
"product_id": "oniguruma-devel-0:5.9.2-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@5.9.2-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"product": {
"name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"product_id": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@5.9.2-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el7.x86_64",
"product": {
"name": "jq-0:1.6-2.el7.x86_64",
"product_id": "jq-0:1.6-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-devel-0:1.6-2.el7.x86_64",
"product": {
"name": "jq-devel-0:1.6-2.el7.x86_64",
"product_id": "jq-devel-0:1.6-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-devel@1.6-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-debuginfo-0:1.6-2.el7.x86_64",
"product": {
"name": "jq-debuginfo-0:1.6-2.el7.x86_64",
"product_id": "jq-debuginfo-0:1.6-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product": {
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product_id": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-113.rhaos4.6.git97d715e.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-113.rhaos4.6.git97d715e.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202010022112.p0.git.94033.ef41184.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libnftnl-0:1.1.5-4.el8.s390x",
"product": {
"name": "libnftnl-0:1.1.5-4.el8.s390x",
"product_id": "libnftnl-0:1.1.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnftnl-devel-0:1.1.5-4.el8.s390x",
"product": {
"name": "libnftnl-devel-0:1.1.5-4.el8.s390x",
"product_id": "libnftnl-devel-0:1.1.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"product": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"product_id": "libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"product": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-devel-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-devel-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-libs-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el8.s390x",
"product": {
"name": "cri-tools-0:1.18.0-3.el8.s390x",
"product_id": "cri-tools-0:1.18.0-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"product_id": "cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"product_id": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-devel-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-devel-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-lite-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-static-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-static-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-static-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-cli-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-cli-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-devel-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-devel-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-devel-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-plugins-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.s390x",
"product_id": "python3-grpcio-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"product": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"product": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_id": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debugsource@2.18.1-12.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"product": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_id": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debuginfo@2.18.1-12.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-caps-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-caps-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-config-generic-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-live-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-live-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-live-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-live@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-network-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-network-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-squash-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-squash-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-squash-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-squash@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-tools-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-tools-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-debugsource-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-debugsource-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debugsource@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:46.82-2.el8.s390x",
"product": {
"name": "redhat-release-coreos-0:46.82-2.el8.s390x",
"product_id": "redhat-release-coreos-0:46.82-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"product": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-4.el8.s390x",
"product": {
"name": "faq-0:0.0.6-4.el8.s390x",
"product_id": "faq-0:0.0.6-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el8.s390x",
"product": {
"name": "jq-0:1.6-2.el8.s390x",
"product_id": "jq-0:1.6-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jq-devel-0:1.6-2.el8.s390x",
"product": {
"name": "jq-devel-0:1.6-2.el8.s390x",
"product_id": "jq-devel-0:1.6-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jq-debugsource-0:1.6-2.el8.s390x",
"product": {
"name": "jq-debugsource-0:1.6-2.el8.s390x",
"product_id": "jq-debugsource-0:1.6-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jq-debuginfo-0:1.6-2.el8.s390x",
"product": {
"name": "jq-debuginfo-0:1.6-2.el8.s390x",
"product_id": "jq-debuginfo-0:1.6-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-devel-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-devel-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-libs-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-libs-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-perl-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-perl-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-static-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-static-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-debugsource-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tini-0:0.16.1-1.el8ar.s390x",
"product": {
"name": "tini-0:0.16.1-1.el8ar.s390x",
"product_id": "tini-0:0.16.1-1.el8ar.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-0:5.6.6-1.el8ar.s390x",
"product": {
"name": "python3-psutil-0:5.6.6-1.el8ar.s390x",
"product_id": "python3-psutil-0:5.6.6-1.el8ar.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"product": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"product": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-0:3.20.1-2.el8.s390x",
"product": {
"name": "inotify-tools-0:3.20.1-2.el8.s390x",
"product_id": "inotify-tools-0:3.20.1-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-devel-0:3.20.1-2.el8.s390x",
"product": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.s390x",
"product_id": "inotify-tools-devel-0:3.20.1-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"product": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"product": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "haproxy20-0:2.0.16-3.el8.s390x",
"product": {
"name": "haproxy20-0:2.0.16-3.el8.s390x",
"product_id": "haproxy20-0:2.0.16-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20@2.0.16-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "haproxy-debugsource-0:2.0.16-3.el8.s390x",
"product": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.s390x",
"product_id": "haproxy-debugsource-0:2.0.16-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.16-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"product": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"product_id": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.16-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-devel-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-devel-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-libs-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_id": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"product_id": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_id": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"product_id": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product_id": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"product": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"product": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"product": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"product": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_id": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn@4.5.0-2.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"product": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_id": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.5.0-2.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"product": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_id": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn-debuginfo@4.5.0-2.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-0:2020.5-4.el8.s390x",
"product_id": "ostree-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-devel-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-devel-0:2020.5-4.el8.s390x",
"product_id": "ostree-devel-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-devel@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-libs-0:2020.5-4.el8.s390x",
"product_id": "ostree-libs-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-debugsource-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-debugsource-0:2020.5-4.el8.s390x",
"product_id": "ostree-debugsource-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debugsource@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-debuginfo-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-debuginfo-0:2020.5-4.el8.s390x",
"product_id": "ostree-debuginfo-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debuginfo@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"product_id": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_id": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.0-20.rhaos4.6.git97d715e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-20.rhaos4.6.git97d715e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "s390utils-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-base@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cmsfs@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cmsfs-fuse@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cpacfstatsd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cpuplugd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-devel@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-hmcdrvfs@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-iucvterm@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-mon_statd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-osasnmpd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-zdsfs@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-ziomon@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-debugsource@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-base-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cmsfs-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cmsfs-fuse-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cpacfstatsd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cpuplugd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-hmcdrvfs-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-iucvterm-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-mon_statd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-osasnmpd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-zdsfs-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-ziomon-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src"
},
"product_reference": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64"
},
"product_reference": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src"
},
"product_reference": "cri-tools-0:1.18.0-3.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64"
},
"product_reference": "cri-tools-0:1.18.0-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src"
},
"product_reference": "jq-0:1.6-2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64"
},
"product_reference": "jq-0:1.6-2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debuginfo-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64"
},
"product_reference": "jq-debuginfo-0:1.6-2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-devel-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64"
},
"product_reference": "jq-devel-0:1.6-2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:5.9.2-5.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src"
},
"product_reference": "oniguruma-0:5.9.2-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64"
},
"product_reference": "oniguruma-0:5.9.2-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64"
},
"product_reference": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64"
},
"product_reference": "oniguruma-devel-0:5.9.2-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src"
},
"product_reference": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src"
},
"product_reference": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-boto3-0:1.4.0-1.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src"
},
"product_reference": "python-boto3-0:1.4.0-1.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-botocore-0:1.4.57-5.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src"
},
"product_reference": "python-botocore-0:1.4.57-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-s3transfer-0:0.1.3-1.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src"
},
"product_reference": "python-s3transfer-0:0.1.3-1.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-boto3-0:1.4.0-1.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch"
},
"product_reference": "python2-boto3-0:1.4.0-1.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-botocore-0:1.4.57-5.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch"
},
"product_reference": "python2-botocore-0:1.4.57-5.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-s3transfer-0:0.1.3-1.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch"
},
"product_reference": "python2-s3transfer-0:0.1.3-1.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-2:2.6.0-28.el8_2.2.src as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src"
},
"product_reference": "s390utils-2:2.6.0-28.el8_2.2.src",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-base-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-1:1.22.8-6.el8_2.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src"
},
"product_reference": "NetworkManager-1:1.22.8-6.el8_2.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch"
},
"product_reference": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch"
},
"product_reference": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch"
},
"product_reference": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x"
},
"product_reference": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64"
},
"product_reference": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x"
},
"product_reference": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64"
},
"product_reference": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch"
},
"product_reference": "ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-http-0:1.0.0-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src"
},
"product_reference": "ansible-runner-http-0:1.0.0-2.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src"
},
"product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch"
},
"product_reference": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src"
},
"product_reference": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch"
},
"product_reference": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch"
},
"product_reference": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch"
},
"product_reference": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src"
},
"product_reference": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src"
},
"product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64"
},
"product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64"
},
"product_reference": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64"
},
"product_reference": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64"
},
"product_reference": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le"
},
"product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x"
},
"product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src"
},
"product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64"
},
"product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le"
},
"product_reference": "cri-tools-0:1.18.0-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x"
},
"product_reference": "cri-tools-0:1.18.0-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src"
},
"product_reference": "cri-tools-0:1.18.0-3.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64"
},
"product_reference": "cri-tools-0:1.18.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:049-75.git20200422.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src"
},
"product_reference": "dracut-0:049-75.git20200422.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-caps-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-caps-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-caps-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-config-generic-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-debugsource-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-live-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-live-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-live-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-live-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-live-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-live-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-network-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-network-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-network-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-squash-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-squash-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-squash-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-squash-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-squash-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-squash-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-tools-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-tools-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-tools-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le"
},
"product_reference": "faq-0:0.0.6-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x"
},
"product_reference": "faq-0:0.0.6-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src"
},
"product_reference": "faq-0:0.0.6-4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64"
},
"product_reference": "faq-0:0.0.6-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-0:2.6.3-2.el8+7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src"
},
"product_reference": "gperftools-0:2.6.3-2.el8+7.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-devel-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-libs-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-0:1.18.0-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src"
},
"product_reference": "grpc-0:1.18.0-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-cli-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-cli-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-devel-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-devel-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-plugins-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy-0:2.0.16-3.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src"
},
"product_reference": "haproxy-0:2.0.16-3.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le"
},
"product_reference": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x"
},
"product_reference": "haproxy-debugsource-0:2.0.16-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64"
},
"product_reference": "haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-0:2.0.16-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le"
},
"product_reference": "haproxy20-0:2.0.16-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-0:2.0.16-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x"
},
"product_reference": "haproxy20-0:2.0.16-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-0:2.0.16-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64"
},
"product_reference": "haproxy20-0:2.0.16-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le"
},
"product_reference": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x"
},
"product_reference": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64"
},
"product_reference": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src"
},
"product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le"
},
"product_reference": "inotify-tools-0:3.20.1-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x"
},
"product_reference": "inotify-tools-0:3.20.1-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-0:3.20.1-2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src"
},
"product_reference": "inotify-tools-0:3.20.1-2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64"
},
"product_reference": "inotify-tools-0:3.20.1-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le"
},
"product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x"
},
"product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64"
},
"product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le"
},
"product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x"
},
"product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64"
},
"product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le"
},
"product_reference": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x"
},
"product_reference": "inotify-tools-devel-0:3.20.1-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64"
},
"product_reference": "inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch"
},
"product_reference": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch"
},
"product_reference": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch"
},
"product_reference": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch"
},
"product_reference": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch"
},
"product_reference": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch"
},
"product_reference": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch"
},
"product_reference": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch"
},
"product_reference": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch"
},
"product_reference": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch"
},
"product_reference": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.235.5.1600670743-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch"
},
"product_reference": "jenkins-0:2.235.5.1600670743-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.235.5.1600670743-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src"
},
"product_reference": "jenkins-0:2.235.5.1600670743-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le"
},
"product_reference": "jq-0:1.6-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x"
},
"product_reference": "jq-0:1.6-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.src"
},
"product_reference": "jq-0:1.6-2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64"
},
"product_reference": "jq-0:1.6-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debuginfo-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le"
},
"product_reference": "jq-debuginfo-0:1.6-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debuginfo-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x"
},
"product_reference": "jq-debuginfo-0:1.6-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debuginfo-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64"
},
"product_reference": "jq-debuginfo-0:1.6-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debugsource-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le"
},
"product_reference": "jq-debugsource-0:1.6-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debugsource-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x"
},
"product_reference": "jq-debugsource-0:1.6-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debugsource-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64"
},
"product_reference": "jq-debugsource-0:1.6-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-devel-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le"
},
"product_reference": "jq-devel-0:1.6-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-devel-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x"
},
"product_reference": "jq-devel-0:1.6-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-devel-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64"
},
"product_reference": "jq-devel-0:1.6-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch"
},
"product_reference": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le"
},
"product_reference": "libnftnl-0:1.1.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x"
},
"product_reference": "libnftnl-0:1.1.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-0:1.1.5-4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src"
},
"product_reference": "libnftnl-0:1.1.5-4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64"
},
"product_reference": "libnftnl-0:1.1.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le"
},
"product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x"
},
"product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64"
},
"product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le"
},
"product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x"
},
"product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64"
},
"product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le"
},
"product_reference": "libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-devel-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x"
},
"product_reference": "libnftnl-devel-0:1.1.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-devel-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64"
},
"product_reference": "libnftnl-devel-0:1.1.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-0:1.0.16-4.5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src"
},
"product_reference": "libsodium-0:1.0.16-4.5.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le"
},
"product_reference": "libunwind-0:1.2.1-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-0:1.2.1-5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src"
},
"product_reference": "libunwind-0:1.2.1-5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64"
},
"product_reference": "libunwind-0:1.2.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le"
},
"product_reference": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64"
},
"product_reference": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le"
},
"product_reference": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64"
},
"product_reference": "libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-devel-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le"
},
"product_reference": "libunwind-devel-0:1.2.1-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-devel-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64"
},
"product_reference": "libunwind-devel-0:1.2.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src"
},
"product_reference": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le"
},
"product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x"
},
"product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src"
},
"product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64"
},
"product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le"
},
"product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x"
},
"product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src"
},
"product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64"
},
"product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le"
},
"product_reference": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x"
},
"product_reference": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64"
},
"product_reference": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le"
},
"product_reference": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x"
},
"product_reference": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64"
},
"product_reference": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src"
},
"product_reference": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src"
},
"product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src"
},
"product_reference": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-15.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src"
},
"product_reference": "openssl-1:1.1.1c-15.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-devel-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-libs-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-perl-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-static-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-static-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-static-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src"
},
"product_reference": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch"
},
"product_reference": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch"
},
"product_reference": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch"
},
"product_reference": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src"
},
"product_reference": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch"
},
"product_reference": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src"
},
"product_reference": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src"
},
"product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch"
},
"product_reference": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-0:2020.5-4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src"
},
"product_reference": "ostree-0:2020.5-4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debuginfo-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debuginfo-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-debuginfo-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debuginfo-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-debuginfo-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debugsource-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-debugsource-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debugsource-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-debugsource-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debugsource-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-debugsource-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-devel-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-devel-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-devel-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-devel-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-devel-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-devel-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-grub2-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-grub2-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-grub2-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-grub2-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-libs-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-libs-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-libs-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src"
},
"product_reference": "ovn2.13-0:20.09.0-1.el8fdp.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pprof-0:2.6.3-2.el8+7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch"
},
"product_reference": "pprof-0:2.6.3-2.el8+7.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le"
},
"product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x"
},
"product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64"
},
"product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-0:3.6.1-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src"
},
"product_reference": "protobuf-0:3.6.1-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-devel-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-lite-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-static-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-static-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-static-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-static-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-vim-0:3.6.1-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch"
},
"product_reference": "protobuf-vim-0:3.6.1-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-alembic-0:1.4.2-5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src"
},
"product_reference": "python-alembic-0:1.4.2-5.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-boto3-0:1.9.101-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src"
},
"product_reference": "python-boto3-0:1.9.101-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-botocore-0:1.12.119-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src"
},
"product_reference": "python-botocore-0:1.12.119-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cachetools-0:3.1.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src"
},
"product_reference": "python-cachetools-0:3.1.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-certifi-0:2018.10.15-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src"
},
"product_reference": "python-certifi-0:2018.10.15-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-construct-0:2.10.56-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src"
},
"product_reference": "python-construct-0:2.10.56-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-daemon-0:2.1.2-9.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src"
},
"product_reference": "python-daemon-0:2.1.2-9.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-dictdiffer-0:0.7.1-2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src"
},
"product_reference": "python-dictdiffer-0:0.7.1-2.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-flask-1:1.1.1-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src"
},
"product_reference": "python-flask-1:1.1.1-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-flask-doc-1:1.1.1-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch"
},
"product_reference": "python-flask-doc-1:1.1.1-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-google-auth-0:1.3.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src"
},
"product_reference": "python-google-auth-0:1.3.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ifaddr-0:0.1.6-5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src"
},
"product_reference": "python-ifaddr-0:0.1.6-5.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src"
},
"product_reference": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src"
},
"product_reference": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-kubernetes-0:11.0.0-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src"
},
"product_reference": "python-kubernetes-0:11.0.0-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src"
},
"product_reference": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lockfile-1:0.11.0-8.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src"
},
"product_reference": "python-lockfile-1:0.11.0-8.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-openshift-1:0.11.2-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src"
},
"product_reference": "python-openshift-1:0.11.2-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src"
},
"product_reference": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src"
},
"product_reference": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch"
},
"product_reference": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src"
},
"product_reference": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch"
},
"product_reference": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pbr-0:5.4.3-2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src"
},
"product_reference": "python-pbr-0:5.4.3-2.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pexpect-0:4.6-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src"
},
"product_reference": "python-pexpect-0:4.6-2.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.6.6-1.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src"
},
"product_reference": "python-psutil-0:5.6.6-1.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le"
},
"product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x"
},
"product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64"
},
"product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pyroute2-0:0.5.3-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src"
},
"product_reference": "python-pyroute2-0:0.5.3-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src"
},
"product_reference": "python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rsa-0:4.6-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src"
},
"product_reference": "python-rsa-0:4.6-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src"
},
"product_reference": "python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le"
},
"product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x"
},
"product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64"
},
"product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-s3transfer-0:0.2.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src"
},
"product_reference": "python-s3transfer-0:0.2.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-string_utils-0:0.6.0-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src"
},
"product_reference": "python-string_utils-0:0.6.0-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src"
},
"product_reference": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src"
},
"product_reference": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tenacity-0:6.2.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src"
},
"product_reference": "python-tenacity-0:6.2.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src"
},
"product_reference": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-websocket-client-0:0.54.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src"
},
"product_reference": "python-websocket-client-0:0.54.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-werkzeug-0:1.0.1-3.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src"
},
"product_reference": "python-werkzeug-0:1.0.1-3.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-zeroconf-0:0.24.4-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src"
},
"product_reference": "python-zeroconf-0:0.24.4-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-botocore-0:1.12.119-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch"
},
"product_reference": "python2-botocore-0:1.12.119-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-cachetools-0:3.1.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch"
},
"product_reference": "python2-cachetools-0:3.1.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-alembic-0:1.4.2-5.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch"
},
"product_reference": "python3-alembic-0:1.4.2-5.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-boto3-0:1.9.101-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch"
},
"product_reference": "python3-boto3-0:1.9.101-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-botocore-0:1.12.119-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch"
},
"product_reference": "python3-botocore-0:1.12.119-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-cachetools-0:3.1.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch"
},
"product_reference": "python3-cachetools-0:3.1.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-certifi-0:2018.10.15-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch"
},
"product_reference": "python3-certifi-0:2018.10.15-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-construct-0:2.10.56-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch"
},
"product_reference": "python3-construct-0:2.10.56-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-daemon-0:2.1.2-9.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch"
},
"product_reference": "python3-daemon-0:2.1.2-9.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch"
},
"product_reference": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-flask-1:1.1.1-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch"
},
"product_reference": "python3-flask-1:1.1.1-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-google-auth-0:1.3.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch"
},
"product_reference": "python3-google-auth-0:1.3.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "python3-grpcio-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch"
},
"product_reference": "python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch"
},
"product_reference": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch"
},
"product_reference": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch"
},
"product_reference": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch"
},
"product_reference": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kubernetes-0:11.0.0-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch"
},
"product_reference": "python3-kubernetes-0:11.0.0-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch"
},
"product_reference": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch"
},
"product_reference": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch"
},
"product_reference": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lockfile-1:0.11.0-8.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch"
},
"product_reference": "python3-lockfile-1:0.11.0-8.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openshift-1:0.11.2-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch"
},
"product_reference": "python3-openshift-1:0.11.2-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch"
},
"product_reference": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch"
},
"product_reference": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch"
},
"product_reference": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch"
},
"product_reference": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch"
},
"product_reference": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch"
},
"product_reference": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-pbr-0:5.4.3-2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch"
},
"product_reference": "python3-pbr-0:5.4.3-2.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-pexpect-0:4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch"
},
"product_reference": "python3-pexpect-0:4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-protobuf-0:3.6.1-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch"
},
"product_reference": "python3-protobuf-0:3.6.1-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le"
},
"product_reference": "python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x"
},
"product_reference": "python3-psutil-0:5.6.6-1.el8ar.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64"
},
"product_reference": "python3-psutil-0:5.6.6-1.el8ar.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le"
},
"product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x"
},
"product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64"
},
"product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-pyroute2-0:0.5.3-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch"
},
"product_reference": "python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch"
},
"product_reference": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rsa-0:4.6-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch"
},
"product_reference": "python3-rsa-0:4.6-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le"
},
"product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x"
},
"product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64"
},
"product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le"
},
"product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x"
},
"product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64"
},
"product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch"
},
"product_reference": "python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-string_utils-0:0.6.0-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch"
},
"product_reference": "python3-string_utils-0:0.6.0-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch"
},
"product_reference": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch"
},
"product_reference": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch"
},
"product_reference": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch"
},
"product_reference": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tenacity-0:6.2.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch"
},
"product_reference": "python3-tenacity-0:6.2.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch"
},
"product_reference": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch"
},
"product_reference": "python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch"
},
"product_reference": "python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch"
},
"product_reference": "python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:46.82-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le"
},
"product_reference": "redhat-release-coreos-0:46.82-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:46.82-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x"
},
"product_reference": "redhat-release-coreos-0:46.82-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:46.82-2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src"
},
"product_reference": "redhat-release-coreos-0:46.82-2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:46.82-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64"
},
"product_reference": "redhat-release-coreos-0:46.82-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch"
},
"product_reference": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src"
},
"product_reference": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src"
},
"product_reference": "rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-0:2020.4-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src"
},
"product_reference": "rpm-ostree-0:2020.4-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-devel-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-libs-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src"
},
"product_reference": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x"
},
"product_reference": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64"
},
"product_reference": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.16.1-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le"
},
"product_reference": "tini-0:0.16.1-1.el8ar.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.16.1-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x"
},
"product_reference": "tini-0:0.16.1-1.el8ar.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.16.1-1.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src"
},
"product_reference": "tini-0:0.16.1-1.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.16.1-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64"
},
"product_reference": "tini-0:0.16.1-1.el8ar.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch"
},
"product_reference": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
},
"product_reference": "toolbox-0:0.0.8-1.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the Kubernetes Product Security Committee"
]
},
{
"names": [
"Wouter ter Maat"
],
"organization": "Offensi",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-8559",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"discovery_date": "2020-06-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1851422"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Kubernetes API server, where it allows an attacker to escalate their privileges from a compromised node. This flaw allows an attacker who can intercept requests on a compromised node, to redirect those requests, along with their credentials, to perform actions on other endpoints that trust those credentials (including other clusters), allowing for escalation of privileges. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kubernetes: compromised node could escalate to cluster level privileges",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Kubernetes is embedded in the version of heketi shipped with Red Hat Gluster Storage 3. However, it does not use Kubernetes API server part and only uses client side bits. Hence, this flaw does not affect heketi.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8559"
},
{
"category": "external",
"summary": "RHBZ#1851422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851422"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8559"
},
{
"category": "external",
"summary": "https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs",
"url": "https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs"
}
],
"release_date": "2020-07-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:47:06+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4197"
},
{
"category": "workaround",
"details": "No mitigation is known.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kubernetes: compromised node could escalate to cluster level privileges"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:47:06+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4197"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:47:06+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4197"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhba-2021_0101
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Jaeger 1.20.2.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Jaeger provides these changes:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2021:0101",
"url": "https://access.redhat.com/errata/RHBA-2021:0101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_0101.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Jaeger 1.20.2 Operator/Operand Containers",
"tracking": {
"current_release_date": "2024-11-13T22:06:33+00:00",
"generator": {
"date": "2024-11-13T22:06:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHBA-2021:0101",
"initial_release_date": "2021-01-13T15:41:50+00:00",
"revision_history": [
{
"date": "2021-01-13T15:41:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-13T15:41:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:06:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Jaeger 1.20",
"product": {
"name": "Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jaeger:1.20::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Jaeger"
},
{
"branches": [
{
"category": "product_version",
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"product": {
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"product": {
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"product": {
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.20.2-3"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"product": {
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"product": {
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.20.2-3"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"product": {
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"product": {
"name": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"product_id": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.20.2-2"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64",
"product": {
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64",
"product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.20.2-2"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64"
},
"product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64"
},
"product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64"
},
"product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64"
},
"product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64"
},
"product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64"
},
"product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64"
},
"product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64 as a component of Red Hat OpenShift Jaeger 1.20",
"product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
},
"product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.20"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-13T15:41:50+00:00",
"details": "Red Hat OpenShift Jaeger Release",
"product_ids": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0101"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-13T15:41:50+00:00",
"details": "Red Hat OpenShift Jaeger Release",
"product_ids": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0101"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64",
"8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2020:5649
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for OpenShift Service Mesh 1.1.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5649",
"url": "https://access.redhat.com/errata/RHSA-2020:5649"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5649.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1.11 security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:40+00:00",
"generator": {
"date": "2025-11-06T23:52:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:5649",
"initial_release_date": "2020-12-22T04:53:46+00:00",
"revision_history": [
{
"date": "2020-12-22T04:53:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-22T04:53:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Service Mesh 1.1",
"product": {
"name": "OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:1.1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "ior-0:1.1.11-2.el8.src",
"product": {
"name": "ior-0:1.1.11-2.el8.src",
"product_id": "ior-0:1.1.11-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ior@1.1.11-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-20.el8.src",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-20.el8.src",
"product_id": "servicemesh-prometheus-0:2.14.0-20.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-20.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:1.1.11-2.el8.src",
"product": {
"name": "servicemesh-cni-0:1.1.11-2.el8.src",
"product_id": "servicemesh-cni-0:1.1.11-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@1.1.11-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:1.1.11-2.el8.src",
"product": {
"name": "servicemesh-0:1.1.11-2.el8.src",
"product_id": "servicemesh-0:1.1.11-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@1.1.11-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-19.el8.src",
"product": {
"name": "servicemesh-grafana-0:6.4.3-19.el8.src",
"product_id": "servicemesh-grafana-0:6.4.3-19.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-19.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:1.1.11-3.el8.src",
"product": {
"name": "servicemesh-operator-0:1.1.11-3.el8.src",
"product_id": "servicemesh-operator-0:1.1.11-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@1.1.11-3.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ior-0:1.1.11-2.el8.x86_64",
"product": {
"name": "ior-0:1.1.11-2.el8.x86_64",
"product_id": "ior-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ior@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"product_id": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-20.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-cni-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-cni-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-citadel@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-galley-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-galley-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-galley-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-galley@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-sidecar-injector@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"product": {
"name": "servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"product_id": "servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-19.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"product": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"product_id": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-19.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:1.1.11-3.el8.x86_64",
"product": {
"name": "servicemesh-operator-0:1.1.11-3.el8.x86_64",
"product_id": "servicemesh-operator-0:1.1.11-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@1.1.11-3.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ior-0:1.1.11-2.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src"
},
"product_reference": "ior-0:1.1.11-2.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ior-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64"
},
"product_reference": "ior-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:1.1.11-2.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src"
},
"product_reference": "servicemesh-0:1.1.11-2.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-citadel-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:1.1.11-2.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src"
},
"product_reference": "servicemesh-cni-0:1.1.11-2.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-cni-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-galley-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-galley-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-19.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src"
},
"product_reference": "servicemesh-grafana-0:6.4.3-19.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-19.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64"
},
"product_reference": "servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64"
},
"product_reference": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:1.1.11-3.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src"
},
"product_reference": "servicemesh-operator-0:1.1.11-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:1.1.11-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64"
},
"product_reference": "servicemesh-operator-0:1.1.11-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-20.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-20.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-22T04:53:46+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5649"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-22T04:53:46+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5649"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHBA-2020:4139
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for 3scale-istio-adapter-rhel8-container is now available for OpenShift Service Mesh.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThe OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html\n\nThis advisory covers the containers for the release.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:4139",
"url": "https://access.redhat.com/errata/RHBA-2020:4139"
},
{
"category": "external",
"summary": "MAISTRA-1854",
"url": "https://issues.redhat.com/browse/MAISTRA-1854"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_4139.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Service Mesh 3scale-istio-adapter-rhel8-container update",
"tracking": {
"current_release_date": "2025-11-06T23:51:26+00:00",
"generator": {
"date": "2025-11-06T23:51:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHBA-2020:4139",
"initial_release_date": "2020-09-30T14:15:38+00:00",
"revision_history": [
{
"date": "2020-09-30T14:15:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-09-30T14:15:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:51:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Service Mesh 1.0",
"product": {
"name": "OpenShift Service Mesh 1.0",
"product_id": "8Base-OSSM-1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:1.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64",
"product": {
"name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64",
"product_id": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64",
"product_identification_helper": {
"purl": "pkg:oci/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/3scale-istio-adapter-rhel8\u0026tag=1.0.0-9"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64 as a component of OpenShift Service Mesh 1.0",
"product_id": "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
},
"product_reference": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64",
"relates_to_product_reference": "8Base-OSSM-1.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-30T14:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4139"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-30T14:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4139"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhba-2020:4139
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for 3scale-istio-adapter-rhel8-container is now available for OpenShift Service Mesh.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThe OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html\n\nThis advisory covers the containers for the release.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:4139",
"url": "https://access.redhat.com/errata/RHBA-2020:4139"
},
{
"category": "external",
"summary": "MAISTRA-1854",
"url": "https://issues.redhat.com/browse/MAISTRA-1854"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_4139.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Service Mesh 3scale-istio-adapter-rhel8-container update",
"tracking": {
"current_release_date": "2025-11-06T23:51:26+00:00",
"generator": {
"date": "2025-11-06T23:51:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHBA-2020:4139",
"initial_release_date": "2020-09-30T14:15:38+00:00",
"revision_history": [
{
"date": "2020-09-30T14:15:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-09-30T14:15:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:51:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Service Mesh 1.0",
"product": {
"name": "OpenShift Service Mesh 1.0",
"product_id": "8Base-OSSM-1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:1.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64",
"product": {
"name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64",
"product_id": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64",
"product_identification_helper": {
"purl": "pkg:oci/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/3scale-istio-adapter-rhel8\u0026tag=1.0.0-9"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64 as a component of OpenShift Service Mesh 1.0",
"product_id": "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
},
"product_reference": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64",
"relates_to_product_reference": "8Base-OSSM-1.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-30T14:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4139"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-30T14:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4139"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2020:4201
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 2.4.2 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Container-native Virtualization 2.4.2 Images (BZ#1877407)\n\nThis advisory contains the following OpenShift Virtualization 2.4.2 images:\n\nRHEL-7-CNV-2.4\n==============\nkubevirt-ssp-operator-container-v2.4.2-2\n\nRHEL-8-CNV-2.4\n==============\nvirt-cdi-controller-container-v2.4.2-1\nvirt-cdi-apiserver-container-v2.4.2-1\nhostpath-provisioner-operator-container-v2.4.2-1\nvirt-cdi-uploadproxy-container-v2.4.2-1\nvirt-cdi-cloner-container-v2.4.2-1\nvirt-cdi-importer-container-v2.4.2-1\nkubevirt-template-validator-container-v2.4.2-1\nhostpath-provisioner-container-v2.4.2-1\nvirt-cdi-uploadserver-container-v2.4.2-1\nvirt-cdi-operator-container-v2.4.2-1\nvirt-controller-container-v2.4.2-1\nkubevirt-cpu-model-nfd-plugin-container-v2.4.2-1\nvirt-api-container-v2.4.2-1\novs-cni-marker-container-v2.4.2-1\nkubevirt-cpu-node-labeller-container-v2.4.2-1\nbridge-marker-container-v2.4.2-1\nkubevirt-metrics-collector-container-v2.4.2-1\nkubemacpool-container-v2.4.2-1\ncluster-network-addons-operator-container-v2.4.2-1\novs-cni-plugin-container-v2.4.2-1\nkubernetes-nmstate-handler-container-v2.4.2-1\ncnv-containernetworking-plugins-container-v2.4.2-1\nvirtio-win-container-v2.4.2-1\nvirt-handler-container-v2.4.2-1\nvirt-launcher-container-v2.4.2-1\ncnv-must-gather-container-v2.4.2-1\nvirt-operator-container-v2.4.2-1\nvm-import-controller-container-v2.4.2-1\nhyperconverged-cluster-operator-container-v2.4.2-1\nvm-import-operator-container-v2.4.2-1\nkubevirt-vmware-container-v2.4.2-1\nkubevirt-v2v-conversion-container-v2.4.2-1\nkubevirt-kvm-info-nfd-plugin-container-v2.4.2-1\nnode-maintenance-operator-container-v2.4.2-1\nhco-bundle-registry-container-v2.4.2-15",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:4201",
"url": "https://access.redhat.com/errata/RHSA-2020:4201"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1869194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869194"
},
{
"category": "external",
"summary": "1869734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869734"
},
{
"category": "external",
"summary": "1875383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875383"
},
{
"category": "external",
"summary": "1877407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877407"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4201.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 2.4.2 Images",
"tracking": {
"current_release_date": "2025-11-06T23:52:18+00:00",
"generator": {
"date": "2025-11-06T23:52:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:4201",
"initial_release_date": "2020-10-06T23:52:47+00:00",
"revision_history": [
{
"date": "2020-10-06T23:52:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-06T23:52:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 2.4 for RHEL 8",
"product": {
"name": "CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:2.4::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-model-nfd-plugin\u0026tag=v2.4.2-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-node-labeller\u0026tag=v2.4.2-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"product_id": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-kvm-info-nfd-plugin\u0026tag=v2.4.2-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64",
"product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v2.4.2-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64 as a component of CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"relates_to_product_reference": "8Base-CNV-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64 as a component of CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"relates_to_product_reference": "8Base-CNV-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64 as a component of CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"relates_to_product_reference": "8Base-CNV-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64 as a component of CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64",
"relates_to_product_reference": "8Base-CNV-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-06T23:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4201"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-06T23:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4201"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHBA-2020:5356
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.23 is now available with\nupdates to packages and images that fix several bugs.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.5.23. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHSA-2020:5359\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:5356",
"url": "https://access.redhat.com/errata/RHBA-2020:5356"
},
{
"category": "external",
"summary": "1905005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905005"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_5356.json"
}
],
"title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.23 packages update",
"tracking": {
"current_release_date": "2025-11-06T23:51:28+00:00",
"generator": {
"date": "2025-11-06T23:51:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHBA-2020:5356",
"initial_release_date": "2020-12-15T19:37:22+00:00",
"revision_history": [
{
"date": "2020-12-15T19:37:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-15T19:37:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:51:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"product": {
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"product_id": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"product": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"product": {
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"product_id": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"product": {
"name": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"product_id": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"product": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"product": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"product": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src"
},
"product_reference": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le"
},
"product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x"
},
"product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src"
},
"product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
},
"product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src"
},
"product_reference": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src"
},
"product_reference": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-15T19:37:22+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:5356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-15T19:37:22+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:5356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2020_3665
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:3665",
"url": "https://access.redhat.com/errata/RHSA-2020:3665"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3665.json"
}
],
"title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
"tracking": {
"current_release_date": "2025-01-06T18:49:15+00:00",
"generator": {
"date": "2025-01-06T18:49:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2020:3665",
"initial_release_date": "2020-09-08T10:05:46+00:00",
"revision_history": [
{
"date": "2020-09-08T10:05:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-09-08T10:05:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T18:49:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset:rhel8:8020020200817154239:02f7cb7a",
"product": {
"name": "go-toolset:rhel8:8020020200817154239:02f7cb7a",
"product_id": "go-toolset:rhel8:8020020200817154239:02f7cb7a",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"product": {
"name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"product_id": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"product": {
"name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"product_id": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"product": {
"name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"product_id": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"product": {
"name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"product_id": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src",
"product": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src",
"product_id": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=src"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=src"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"product": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"product_id": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"product": {
"name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"product_id": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"product": {
"name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"product_id": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"product": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"product": {
"name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"product_id": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"product": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"product": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"product": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
"product_reference": "go-toolset:rhel8:8020020200817154239:02f7cb7a",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src"
},
"product_reference": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64"
},
"product_reference": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64"
},
"product_reference": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64"
},
"product_reference": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64"
},
"product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le"
},
"product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x"
},
"product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64"
},
"product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch"
},
"product_reference": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch"
},
"product_reference": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64"
},
"product_reference": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch"
},
"product_reference": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch"
},
"product_reference": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-08T10:05:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:3665"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-08T10:05:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:3665"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-08T10:05:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:3665"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2020:3665
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:3665",
"url": "https://access.redhat.com/errata/RHSA-2020:3665"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3665.json"
}
],
"title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
"tracking": {
"current_release_date": "2025-11-07T15:51:49+00:00",
"generator": {
"date": "2025-11-07T15:51:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:3665",
"initial_release_date": "2020-09-08T10:05:46+00:00",
"revision_history": [
{
"date": "2020-09-08T10:05:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-09-08T10:05:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T15:51:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"product": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src (go-toolset:rhel8)",
"product_id": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=src\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=src\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src (go-toolset:rhel8)",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=src\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8)",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product": {
"name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8)",
"product_id": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product": {
"name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8)",
"product_id": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product": {
"name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8)",
"product_id": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product": {
"name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8)",
"product_id": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x (go-toolset:rhel8)",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le (go-toolset:rhel8)",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 (go-toolset:rhel8)",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-08T10:05:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:3665"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-08T10:05:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:3665"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-08T10:05:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:3665"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhba-2020_4197
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.6.1 is now available with\nupdates to packages and images that fix several bugs and add enhancements.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat\nOpenShift Container Platform 4.6.1. See the following advisory for the\ncontainer images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2020:4196\n\nSpace precludes documenting all of the bug fixes and enhancements in this\nadvisory, as well as all of the container images in this advisory. See the\nfollowing Release Notes documentation, which will be updated shortly for\nthis release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:4197",
"url": "https://access.redhat.com/errata/RHBA-2020:4197"
},
{
"category": "external",
"summary": "1834410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834410"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_4197.json"
}
],
"title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6 GA RPMs",
"tracking": {
"current_release_date": "2025-01-05T19:12:22+00:00",
"generator": {
"date": "2025-01-05T19:12:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHBA-2020:4197",
"initial_release_date": "2020-10-27T14:47:06+00:00",
"revision_history": [
{
"date": "2020-10-27T14:47:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-27T14:47:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-05T19:12:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"product": {
"name": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"product_id": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl100-firmware@39.31.5.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"product": {
"name": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"product_id": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl1000-firmware@39.31.5.1-98.el8.1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl105-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl135-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl2000-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl2030-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"product": {
"name": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"product_id": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl3160-firmware@25.30.13.0-98.el8.1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"product": {
"name": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"product_id": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl3945-firmware@15.32.2.9-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"product": {
"name": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"product_id": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl4965-firmware@228.61.2.24-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"product": {
"name": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"product_id": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl5000-firmware@8.83.5.1_1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"product": {
"name": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"product_id": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl5150-firmware@8.24.2.2-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"product": {
"name": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"product_id": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6000-firmware@9.221.4.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6000g2a-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"product": {
"name": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_id": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6000g2b-firmware@18.168.6.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"product": {
"name": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"product_id": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl6050-firmware@41.28.5.1-98.el8.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"product": {
"name": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"product_id": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iwl7260-firmware@25.30.13.0-98.el8.1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libertas-sd8686-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libertas-sd8787-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libertas-usb8388-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libertas-usb8388-olpc-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product": {
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_id": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/linux-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pprof-0:2.6.3-2.el8+7.noarch",
"product": {
"name": "pprof-0:2.6.3-2.el8+7.noarch",
"product_id": "pprof-0:2.6.3-2.el8+7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pprof@2.6.3-2.el8%2B7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product": {
"name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_id": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kuryr-binding-scripts@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product": {
"name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_id": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-lib@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product": {
"name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_id": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-lib-tests@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"product": {
"name": "python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"product_id": "python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-pyroute2@0.5.3-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "protobuf-vim-0:3.6.1-4.el8ost.noarch",
"product": {
"name": "protobuf-vim-0:3.6.1-4.el8ost.noarch",
"product_id": "protobuf-vim-0:3.6.1-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-vim@3.6.1-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-protobuf-0:3.6.1-4.el8ost.noarch",
"product": {
"name": "python3-protobuf-0:3.6.1-4.el8ost.noarch",
"product_id": "python3-protobuf-0:3.6.1-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-protobuf@3.6.1-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"product": {
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"product_id": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhcos-tools@0.0.0-1.rhaos4.2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"product": {
"name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"product_id": "ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-http@1.0.0-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"product": {
"name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"product_id": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-requests-unixsocket@0.1.5-5.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"product": {
"name": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"product_id": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ironic-lib@4.3.0-0.20200605221931.df238ba.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product": {
"name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product_id": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openstacksdk@0.48.0-0.20200708092906.3b693c2.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product": {
"name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product_id": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openstacksdk-tests@0.48.0-0.20200708092906.3b693c2.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"product": {
"name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"product_id": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keystoneauth1@4.2.0-0.20200630234358.dab8e10.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"product": {
"name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"product_id": "python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-zeroconf@0.24.4-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"product": {
"name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"product_id": "python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ifaddr@0.1.6-5.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-construct-0:2.10.56-1.el8ost.noarch",
"product": {
"name": "python3-construct-0:2.10.56-1.el8ost.noarch",
"product_id": "python3-construct-0:2.10.56-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-construct@2.10.56-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kubernetes-0:11.0.0-1.el8.noarch",
"product": {
"name": "python3-kubernetes-0:11.0.0-1.el8.noarch",
"product_id": "python3-kubernetes-0:11.0.0-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kubernetes@11.0.0-1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"product": {
"name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"product_id": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kubernetes-tests@11.0.0-1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-openshift-1:0.11.2-1.el8.noarch",
"product": {
"name": "python3-openshift-1:0.11.2-1.el8.noarch",
"product_id": "python3-openshift-1:0.11.2-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openshift@0.11.2-1.el8?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_id": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/octavia-amphora-image-x86_64@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-all@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-ipa@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-ipa-ppc64le@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-ipa-x86_64@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-minimal@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-ppc64le@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product": {
"name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_id": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images-x86_64@17.0-20200606.1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"product": {
"name": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"product_id": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-config-connectivity-redhat@1.22.8-6.el8_2?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"product": {
"name": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"product_id": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-config-server@1.22.8-6.el8_2?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"product": {
"name": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"product_id": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-dispatcher-routing-rules@1.22.8-6.el8_2?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-pexpect-0:4.6-2.el8ar.noarch",
"product": {
"name": "python3-pexpect-0:4.6-2.el8ar.noarch",
"product_id": "python3-pexpect-0:4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-pexpect@4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-lockfile-1:0.11.0-8.el8ar.noarch",
"product": {
"name": "python3-lockfile-1:0.11.0-8.el8ar.noarch",
"product_id": "python3-lockfile-1:0.11.0-8.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-lockfile@0.11.0-8.el8ar?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-daemon-0:2.1.2-9.el8ar.noarch",
"product": {
"name": "python3-daemon-0:2.1.2-9.el8ar.noarch",
"product_id": "python3-daemon-0:2.1.2-9.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-daemon@2.1.2-9.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"product": {
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"product_id": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.8-1.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"product": {
"name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"product_id": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tooz@2.7.0-0.20200723133754.fca43df.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-rsa-0:4.6-1.el8.noarch",
"product": {
"name": "python3-rsa-0:4.6-1.el8.noarch",
"product_id": "python3-rsa-0:4.6-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rsa@4.6-1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product": {
"name": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_id": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-oslo-concurrency-lang@4.2.0-0.20200708091908.35e4df4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product": {
"name": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_id": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-oslo-concurrency@4.2.0-0.20200708091908.35e4df4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product": {
"name": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_id": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-oslo-concurrency-tests@4.2.0-0.20200708091908.35e4df4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector-api@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector-conductor@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector-dnsmasq@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product": {
"name": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_id": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ironic-inspector-tests@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-flask-doc-1:1.1.1-1.el8ost.noarch",
"product": {
"name": "python-flask-doc-1:1.1.1-1.el8ost.noarch",
"product_id": "python-flask-doc-1:1.1.1-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-flask-doc@1.1.1-1.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-flask-1:1.1.1-1.el8ost.noarch",
"product": {
"name": "python3-flask-1:1.1.1-1.el8ost.noarch",
"product_id": "python3-flask-1:1.1.1-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-flask@1.1.1-1.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"product": {
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"product_id": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.144.0-1.rhaos4.6.el8?arch=noarch\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python3-pbr-0:5.4.3-2.el8ost.noarch",
"product": {
"name": "python3-pbr-0:5.4.3-2.el8ost.noarch",
"product_id": "python3-pbr-0:5.4.3-2.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-pbr@5.4.3-2.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product": {
"name": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product_id": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-sushy@3.3.0-0.20200804091926.0dfe74a.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product": {
"name": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product_id": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-sushy-tests@3.3.0-0.20200804091926.0dfe74a.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"product": {
"name": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"product_id": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-test@2.13.0-52.el8fdp?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"product": {
"name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"product_id": "python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-websocket-client@0.54.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-string_utils-0:0.6.0-4.el8ost.noarch",
"product": {
"name": "python3-string_utils-0:0.6.0-4.el8ost.noarch",
"product_id": "python3-string_utils-0:0.6.0-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-string_utils@0.6.0-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-google-auth-0:1.3.0-1.el8ost.noarch",
"product": {
"name": "python3-google-auth-0:1.3.0-1.el8ost.noarch",
"product_id": "python3-google-auth-0:1.3.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-google-auth@1.3.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"product": {
"name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"product_id": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-dictdiffer@0.7.1-2.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-certifi-0:2018.10.15-4.el8ost.noarch",
"product": {
"name": "python3-certifi-0:2018.10.15-4.el8ost.noarch",
"product_id": "python3-certifi-0:2018.10.15-4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-certifi@2018.10.15-4.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-cachetools-0:3.1.0-1.el8ost.noarch",
"product": {
"name": "python2-cachetools-0:3.1.0-1.el8ost.noarch",
"product_id": "python2-cachetools-0:3.1.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-cachetools@3.1.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-cachetools-0:3.1.0-1.el8ost.noarch",
"product": {
"name": "python3-cachetools-0:3.1.0-1.el8ost.noarch",
"product_id": "python3-cachetools-0:3.1.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-cachetools@3.1.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"product": {
"name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"product_id": "python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-s3transfer@0.2.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-boto3-0:1.9.101-1.el8ost.noarch",
"product": {
"name": "python3-boto3-0:1.9.101-1.el8ost.noarch",
"product_id": "python3-boto3-0:1.9.101-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-boto3@1.9.101-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-botocore-0:1.12.119-1.el8ost.noarch",
"product": {
"name": "python2-botocore-0:1.12.119-1.el8ost.noarch",
"product_id": "python2-botocore-0:1.12.119-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-botocore@1.12.119-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-botocore-0:1.12.119-1.el8ost.noarch",
"product": {
"name": "python3-botocore-0:1.12.119-1.el8ost.noarch",
"product_id": "python3-botocore-0:1.12.119-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-botocore@1.12.119-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-0:2.235.5.1600670743-1.el8.noarch",
"product": {
"name": "jenkins-0:2.235.5.1600670743-1.el8.noarch",
"product_id": "jenkins-0:2.235.5.1600670743-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.235.5.1600670743-1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product": {
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product_id": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-python-agent@6.3.1-0.20200918042952.9dd968f.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product": {
"name": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product_id": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ironic-python-agent@6.3.1-0.20200918042952.9dd968f.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-tenacity-0:6.2.0-1.el8ost.noarch",
"product": {
"name": "python3-tenacity-0:6.2.0-1.el8ost.noarch",
"product_id": "python3-tenacity-0:6.2.0-1.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tenacity@6.2.0-1.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"product": {
"name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"product_id": "python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-werkzeug@1.0.1-3.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product": {
"name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product_id": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-sushy-oem-idrac@0.0.3-0.20200922221223.1202372.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product": {
"name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product_id": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-sushy-oem-idrac-tests@0.0.3-0.20200922221223.1202372.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product": {
"name": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_id": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-api@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product": {
"name": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_id": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-common@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product": {
"name": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_id": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-conductor@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product": {
"name": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_id": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ironic-tests@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product": {
"name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_id": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-oslo-db-lang@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product": {
"name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_id": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-oslo-db@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product": {
"name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_id": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-oslo-db-tests@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-alembic-0:1.4.2-5.el8ost.noarch",
"product": {
"name": "python3-alembic-0:1.4.2-5.el8ost.noarch",
"product_id": "python3-alembic-0:1.4.2-5.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-alembic@1.4.2-5.el8ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.24.1.el8_2.dt1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_id": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.24.1.el8_2.dt1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"product": {
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"product_id": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/console-login-helper-messages@0.19-3.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"product": {
"name": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"product_id": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/console-login-helper-messages-issuegen@0.19-3.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"product": {
"name": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"product_id": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/console-login-helper-messages-profile@0.19-3.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-boto3-0:1.4.0-1.el7.noarch",
"product": {
"name": "python2-boto3-0:1.4.0-1.el7.noarch",
"product_id": "python2-boto3-0:1.4.0-1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-boto3@1.4.0-1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-botocore-0:1.4.57-5.el7.noarch",
"product": {
"name": "python2-botocore-0:1.4.57-5.el7.noarch",
"product_id": "python2-botocore-0:1.4.57-5.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-botocore@1.4.57-5.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python2-s3transfer-0:0.1.3-1.el7.noarch",
"product": {
"name": "python2-s3transfer-0:0.1.3-1.el7.noarch",
"product_id": "python2-s3transfer-0:0.1.3-1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python2-s3transfer@0.1.3-1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product_id": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202010011112.p0.git.0.f35f5eb.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product_id": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.6.0-202010011112.p0.git.0.f35f5eb.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"product": {
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"product_id": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/linux-firmware@20200512-98.gitb2cad6a2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "libunwind-0:1.2.1-5.el8.src",
"product": {
"name": "libunwind-0:1.2.1-5.el8.src",
"product_id": "libunwind-0:1.2.1-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "libnftnl-0:1.1.5-4.el8.src",
"product": {
"name": "libnftnl-0:1.1.5-4.el8.src",
"product_id": "libnftnl-0:1.1.5-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "gperftools-0:2.6.3-2.el8+7.src",
"product": {
"name": "gperftools-0:2.6.3-2.el8+7.src",
"product_id": "gperftools-0:2.6.3-2.el8+7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=src"
}
}
},
{
"category": "product_version",
"name": "libsodium-0:1.0.16-4.5.el8ost.src",
"product": {
"name": "libsodium-0:1.0.16-4.5.el8ost.src",
"product_id": "libsodium-0:1.0.16-4.5.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"product": {
"name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"product_id": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-kuryr-lib@1.1.1-0.20190923160834.41e6964.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.src",
"product": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.src",
"product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pyroute2-0:0.5.3-4.el8ost.src",
"product": {
"name": "python-pyroute2-0:0.5.3-4.el8ost.src",
"product_id": "python-pyroute2-0:0.5.3-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pyroute2@0.5.3-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el8.src",
"product": {
"name": "cri-tools-0:1.18.0-3.el8.src",
"product_id": "cri-tools-0:1.18.0-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "protobuf-0:3.6.1-4.el8ost.src",
"product": {
"name": "protobuf-0:3.6.1-4.el8ost.src",
"product_id": "protobuf-0:3.6.1-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"product": {
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"product_id": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhcos-tools@0.0.0-1.rhaos4.2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "grpc-0:1.18.0-4.el8ost.src",
"product": {
"name": "grpc-0:1.18.0-4.el8ost.src",
"product_id": "grpc-0:1.18.0-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"product": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "dracut-0:049-75.git20200422.el8.src",
"product": {
"name": "dracut-0:049-75.git20200422.el8.src",
"product_id": "dracut-0:049-75.git20200422.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:46.82-2.el8.src",
"product": {
"name": "redhat-release-coreos-0:46.82-2.el8.src",
"product_id": "redhat-release-coreos-0:46.82-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"product": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-4.el8.src",
"product": {
"name": "faq-0:0.0.6-4.el8.src",
"product_id": "faq-0:0.0.6-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el8.src",
"product": {
"name": "jq-0:1.6-2.el8.src",
"product_id": "jq-0:1.6-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.1.1c-15.el8.src",
"product": {
"name": "openssl-1:1.1.1c-15.el8.src",
"product_id": "openssl-1:1.1.1c-15.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tini-0:0.16.1-1.el8ar.src",
"product": {
"name": "tini-0:0.16.1-1.el8ar.src",
"product_id": "tini-0:0.16.1-1.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-psutil-0:5.6.6-1.el8ar.src",
"product": {
"name": "python-psutil-0:5.6.6-1.el8ar.src",
"product_id": "python-psutil-0:5.6.6-1.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil@5.6.6-1.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-http-0:1.0.0-2.el8ar.src",
"product": {
"name": "ansible-runner-http-0:1.0.0-2.el8ar.src",
"product_id": "ansible-runner-http-0:1.0.0-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-http@1.0.0-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"product": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-0:3.20.1-2.el8.src",
"product": {
"name": "inotify-tools-0:3.20.1-2.el8.src",
"product_id": "inotify-tools-0:3.20.1-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"product": {
"name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"product_id": "python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests-unixsocket@0.1.5-5.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"product": {
"name": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"product_id": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ironic-lib@4.3.0-0.20200605221931.df238ba.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"product": {
"name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"product_id": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-openstacksdk@0.48.0-0.20200708092906.3b693c2.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"product": {
"name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"product_id": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-keystoneauth1@4.2.0-0.20200630234358.dab8e10.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-zeroconf-0:0.24.4-1.el8ost.src",
"product": {
"name": "python-zeroconf-0:0.24.4-1.el8ost.src",
"product_id": "python-zeroconf-0:0.24.4-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-zeroconf@0.24.4-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-ifaddr-0:0.1.6-5.el8ost.src",
"product": {
"name": "python-ifaddr-0:0.1.6-5.el8ost.src",
"product_id": "python-ifaddr-0:0.1.6-5.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ifaddr@0.1.6-5.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-construct-0:2.10.56-1.el8ost.src",
"product": {
"name": "python-construct-0:2.10.56-1.el8ost.src",
"product_id": "python-construct-0:2.10.56-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-construct@2.10.56-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-kubernetes-0:11.0.0-1.el8.src",
"product": {
"name": "python-kubernetes-0:11.0.0-1.el8.src",
"product_id": "python-kubernetes-0:11.0.0-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-kubernetes@11.0.0-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-openshift-1:0.11.2-1.el8.src",
"product": {
"name": "python-openshift-1:0.11.2-1.el8.src",
"product_id": "python-openshift-1:0.11.2-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-openshift@0.11.2-1.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"product": {
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"product_id": "rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhosp-director-images@17.0-20200606.1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-1:1.22.8-6.el8_2.src",
"product": {
"name": "NetworkManager-1:1.22.8-6.el8_2.src",
"product_id": "NetworkManager-1:1.22.8-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "haproxy-0:2.0.16-3.el8.src",
"product": {
"name": "haproxy-0:2.0.16-3.el8.src",
"product_id": "haproxy-0:2.0.16-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy@2.0.16-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pexpect-0:4.6-2.el8ar.src",
"product": {
"name": "python-pexpect-0:4.6-2.el8ar.src",
"product_id": "python-pexpect-0:4.6-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pexpect@4.6-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-lockfile-1:0.11.0-8.el8ar.src",
"product": {
"name": "python-lockfile-1:0.11.0-8.el8ar.src",
"product_id": "python-lockfile-1:0.11.0-8.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lockfile@0.11.0-8.el8ar?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-daemon-0:2.1.2-9.el8ar.src",
"product": {
"name": "python-daemon-0:2.1.2-9.el8ar.src",
"product_id": "python-daemon-0:2.1.2-9.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-daemon@2.1.2-9.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.src",
"product": {
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.src",
"product_id": "toolbox-0:0.0.8-1.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.8-1.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"product": {
"name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"product_id": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-tooz@2.7.0-0.20200723133754.fca43df.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-rsa-0:4.6-1.el8.src",
"product": {
"name": "python-rsa-0:4.6-1.el8.src",
"product_id": "python-rsa-0:4.6-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-rsa@4.6-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"product": {
"name": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"product_id": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-oslo-concurrency@4.2.0-0.20200708091908.35e4df4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-0:2020.4-1.el8.src",
"product": {
"name": "rpm-ostree-0:2020.4-1.el8.src",
"product_id": "rpm-ostree-0:2020.4-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"product": {
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"product_id": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-inspector@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-flask-1:1.1.1-1.el8ost.src",
"product": {
"name": "python-flask-1:1.1.1-1.el8ost.src",
"product_id": "python-flask-1:1.1.1-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-flask@1.1.1-1.el8ost?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"product": {
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"product_id": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.144.0-1.rhaos4.6.el8?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python-pbr-0:5.4.3-2.el8ost.src",
"product": {
"name": "python-pbr-0:5.4.3-2.el8ost.src",
"product_id": "python-pbr-0:5.4.3-2.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pbr@5.4.3-2.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"product": {
"name": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"product_id": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sushy@3.3.0-0.20200804091926.0dfe74a.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.src",
"product": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.src",
"product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-websocket-client-0:0.54.0-1.el8ost.src",
"product": {
"name": "python-websocket-client-0:0.54.0-1.el8ost.src",
"product_id": "python-websocket-client-0:0.54.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-websocket-client@0.54.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-string_utils-0:0.6.0-4.el8ost.src",
"product": {
"name": "python-string_utils-0:0.6.0-4.el8ost.src",
"product_id": "python-string_utils-0:0.6.0-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-string_utils@0.6.0-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"product": {
"name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"product_id": "python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ruamel-yaml@0.15.41-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-google-auth-0:1.3.0-1.el8ost.src",
"product": {
"name": "python-google-auth-0:1.3.0-1.el8ost.src",
"product_id": "python-google-auth-0:1.3.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-google-auth@1.3.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-dictdiffer-0:0.7.1-2.el8ost.src",
"product": {
"name": "python-dictdiffer-0:0.7.1-2.el8ost.src",
"product_id": "python-dictdiffer-0:0.7.1-2.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-dictdiffer@0.7.1-2.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-certifi-0:2018.10.15-4.el8ost.src",
"product": {
"name": "python-certifi-0:2018.10.15-4.el8ost.src",
"product_id": "python-certifi-0:2018.10.15-4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-certifi@2018.10.15-4.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-cachetools-0:3.1.0-1.el8ost.src",
"product": {
"name": "python-cachetools-0:3.1.0-1.el8ost.src",
"product_id": "python-cachetools-0:3.1.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cachetools@3.1.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-s3transfer-0:0.2.0-1.el8ost.src",
"product": {
"name": "python-s3transfer-0:0.2.0-1.el8ost.src",
"product_id": "python-s3transfer-0:0.2.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-s3transfer@0.2.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-boto3-0:1.9.101-1.el8ost.src",
"product": {
"name": "python-boto3-0:1.9.101-1.el8ost.src",
"product_id": "python-boto3-0:1.9.101-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-boto3@1.9.101-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-botocore-0:1.12.119-1.el8ost.src",
"product": {
"name": "python-botocore-0:1.12.119-1.el8ost.src",
"product_id": "python-botocore-0:1.12.119-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-botocore@1.12.119-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"product": {
"name": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"product_id": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rust-afterburn@4.5.0-2.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-0:2.235.5.1600670743-1.el8.src",
"product": {
"name": "jenkins-0:2.235.5.1600670743-1.el8.src",
"product_id": "jenkins-0:2.235.5.1600670743-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.235.5.1600670743-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"product": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"product": {
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"product_id": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic-python-agent@6.3.1-0.20200918042952.9dd968f.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-tenacity-0:6.2.0-1.el8ost.src",
"product": {
"name": "python-tenacity-0:6.2.0-1.el8ost.src",
"product_id": "python-tenacity-0:6.2.0-1.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-tenacity@6.2.0-1.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-werkzeug-0:1.0.1-3.el8ost.src",
"product": {
"name": "python-werkzeug-0:1.0.1-3.el8ost.src",
"product_id": "python-werkzeug-0:1.0.1-3.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-werkzeug@1.0.1-3.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "ostree-0:2020.5-4.el8.src",
"product": {
"name": "ostree-0:2020.5-4.el8.src",
"product_id": "ostree-0:2020.5-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.src",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.src",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"product": {
"name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"product_id": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sushy-oem-idrac@0.0.3-0.20200922221223.1202372.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"product": {
"name": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"product_id": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-ironic@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"product": {
"name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"product_id": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-oslo-db@8.4.0-0.20200918104110.e42c733.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-alembic-0:1.4.2-5.el8ost.src",
"product": {
"name": "python-alembic-0:1.4.2-5.el8ost.src",
"product_id": "python-alembic-0:1.4.2-5.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-alembic@1.4.2-5.el8ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"product": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"product": {
"name": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"product_id": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"product": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-0:20.09.0-1.el8fdp.src",
"product": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.src",
"product_id": "ovn2.13-0:20.09.0-1.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"product": {
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"product_id": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202010022112.p0.git.94033.ef41184.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"product": {
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"product_id": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/console-login-helper-messages@0.19-3.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-boto3-0:1.4.0-1.el7.src",
"product": {
"name": "python-boto3-0:1.4.0-1.el7.src",
"product_id": "python-boto3-0:1.4.0-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-boto3@1.4.0-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-botocore-0:1.4.57-5.el7.src",
"product": {
"name": "python-botocore-0:1.4.57-5.el7.src",
"product_id": "python-botocore-0:1.4.57-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-botocore@1.4.57-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el7.src",
"product": {
"name": "cri-tools-0:1.18.0-3.el7.src",
"product_id": "cri-tools-0:1.18.0-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "oniguruma-0:5.9.2-5.el7.src",
"product": {
"name": "oniguruma-0:5.9.2-5.el7.src",
"product_id": "oniguruma-0:5.9.2-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@5.9.2-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el7.src",
"product": {
"name": "jq-0:1.6-2.el7.src",
"product_id": "jq-0:1.6-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-s3transfer-0:0.1.3-1.el7.src",
"product": {
"name": "python-s3transfer-0:0.1.3-1.el7.src",
"product_id": "python-s3transfer-0:0.1.3-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-s3transfer@0.1.3-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.src",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.src",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el7?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"product": {
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"product_id": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202010011112.p0.git.0.f35f5eb.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"product": {
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"product_id": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-113.rhaos4.6.git97d715e.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"product": {
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"product_id": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202010022112.p0.git.94033.ef41184.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "s390utils-2:2.6.0-28.el8_2.2.src",
"product": {
"name": "s390utils-2:2.6.0-28.el8_2.2.src",
"product_id": "s390utils-2:2.6.0-28.el8_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils@2.6.0-28.el8_2.2?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libunwind-0:1.2.1-5.el8.ppc64le",
"product": {
"name": "libunwind-0:1.2.1-5.el8.ppc64le",
"product_id": "libunwind-0:1.2.1-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libunwind-devel-0:1.2.1-5.el8.ppc64le",
"product": {
"name": "libunwind-devel-0:1.2.1-5.el8.ppc64le",
"product_id": "libunwind-devel-0:1.2.1-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-devel@1.2.1-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"product": {
"name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"product_id": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-debugsource@1.2.1-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"product": {
"name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"product_id": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-debuginfo@1.2.1-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnftnl-0:1.1.5-4.el8.ppc64le",
"product": {
"name": "libnftnl-0:1.1.5-4.el8.ppc64le",
"product_id": "libnftnl-0:1.1.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"product": {
"name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"product_id": "libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"product": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"product_id": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"product": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"product": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8%2B7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"product": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_id": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-8.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el8.ppc64le",
"product": {
"name": "cri-tools-0:1.18.0-3.el8.ppc64le",
"product_id": "cri-tools-0:1.18.0-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"product_id": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"product_id": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"product_id": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_id": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debugsource@2.18.1-12.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_id": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debuginfo@2.18.1-12.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-caps-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-caps-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-live-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-live-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-live-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-live@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-network-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-network-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-squash-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-squash-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-squash-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-squash@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-tools-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-tools-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debugsource@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"product": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"product_id": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@049-75.git20200422.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:46.82-2.el8.ppc64le",
"product": {
"name": "redhat-release-coreos-0:46.82-2.el8.ppc64le",
"product_id": "redhat-release-coreos-0:46.82-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"product": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-4.el8.ppc64le",
"product": {
"name": "faq-0:0.0.6-4.el8.ppc64le",
"product_id": "faq-0:0.0.6-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el8.ppc64le",
"product": {
"name": "jq-0:1.6-2.el8.ppc64le",
"product_id": "jq-0:1.6-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jq-devel-0:1.6-2.el8.ppc64le",
"product": {
"name": "jq-devel-0:1.6-2.el8.ppc64le",
"product_id": "jq-devel-0:1.6-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jq-debugsource-0:1.6-2.el8.ppc64le",
"product": {
"name": "jq-debugsource-0:1.6-2.el8.ppc64le",
"product_id": "jq-debugsource-0:1.6-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "jq-debuginfo-0:1.6-2.el8.ppc64le",
"product": {
"name": "jq-debuginfo-0:1.6-2.el8.ppc64le",
"product_id": "jq-debuginfo-0:1.6-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-devel-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-libs-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-perl-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-static-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-static-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tini-0:0.16.1-1.el8ar.ppc64le",
"product": {
"name": "tini-0:0.16.1-1.el8ar.ppc64le",
"product_id": "tini-0:0.16.1-1.el8ar.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"product": {
"name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"product_id": "python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"product": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"product": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-0:3.20.1-2.el8.ppc64le",
"product": {
"name": "inotify-tools-0:3.20.1-2.el8.ppc64le",
"product_id": "inotify-tools-0:3.20.1-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"product": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"product_id": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"product": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"product": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_id": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "haproxy20-0:2.0.16-3.el8.ppc64le",
"product": {
"name": "haproxy20-0:2.0.16-3.el8.ppc64le",
"product_id": "haproxy20-0:2.0.16-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20@2.0.16-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"product": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"product_id": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.16-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"product": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"product_id": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.16-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"product": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"product_id": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.4-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"product": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"product": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"product": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_id": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn@4.5.0-2.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_id": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.5.0-2.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_id": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn-debuginfo@4.5.0-2.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_id": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.6.0-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-devel-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-devel-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-devel-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-devel@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-grub2-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-grub2-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-grub2-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-grub2@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-libs-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-libs-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-debugsource-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-debugsource-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-debugsource-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debugsource@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debuginfo@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"product": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"product_id": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.5-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.0-20.rhaos4.6.git97d715e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-20.rhaos4.6.git97d715e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_id": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-1.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-1.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libunwind-0:1.2.1-5.el8.x86_64",
"product": {
"name": "libunwind-0:1.2.1-5.el8.x86_64",
"product_id": "libunwind-0:1.2.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libunwind-devel-0:1.2.1-5.el8.x86_64",
"product": {
"name": "libunwind-devel-0:1.2.1-5.el8.x86_64",
"product_id": "libunwind-devel-0:1.2.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-devel@1.2.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"product": {
"name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"product_id": "libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-debugsource@1.2.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"product": {
"name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"product_id": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libunwind-debuginfo@1.2.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnftnl-0:1.1.5-4.el8.x86_64",
"product": {
"name": "libnftnl-0:1.1.5-4.el8.x86_64",
"product_id": "libnftnl-0:1.1.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnftnl-devel-0:1.1.5-4.el8.x86_64",
"product": {
"name": "libnftnl-devel-0:1.1.5-4.el8.x86_64",
"product_id": "libnftnl-devel-0:1.1.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"product": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"product_id": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"product": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"product": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8%2B7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"product": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_id": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-8.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el8.x86_64",
"product": {
"name": "cri-tools-0:1.18.0-3.el8.x86_64",
"product_id": "cri-tools-0:1.18.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"product_id": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"product_id": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-static-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-static-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-static-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-cli-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-cli-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-devel-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-devel-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-devel-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"product_id": "python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_id": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debugsource@2.18.1-12.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_id": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debuginfo@2.18.1-12.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-caps-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-caps-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-live-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-live-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-live-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-live@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-network-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-network-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-squash-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-squash-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-squash-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-squash@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-tools-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-tools-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debugsource@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"product": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"product_id": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@049-75.git20200422.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:46.82-2.el8.x86_64",
"product": {
"name": "redhat-release-coreos-0:46.82-2.el8.x86_64",
"product_id": "redhat-release-coreos-0:46.82-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"product": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-4.el8.x86_64",
"product": {
"name": "faq-0:0.0.6-4.el8.x86_64",
"product_id": "faq-0:0.0.6-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el8.x86_64",
"product": {
"name": "jq-0:1.6-2.el8.x86_64",
"product_id": "jq-0:1.6-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-devel-0:1.6-2.el8.x86_64",
"product": {
"name": "jq-devel-0:1.6-2.el8.x86_64",
"product_id": "jq-devel-0:1.6-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-debugsource-0:1.6-2.el8.x86_64",
"product": {
"name": "jq-debugsource-0:1.6-2.el8.x86_64",
"product_id": "jq-debugsource-0:1.6-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-debuginfo-0:1.6-2.el8.x86_64",
"product": {
"name": "jq-debuginfo-0:1.6-2.el8.x86_64",
"product_id": "jq-debuginfo-0:1.6-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-devel-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-libs-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-perl-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-static-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-static-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-15.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tini-0:0.16.1-1.el8ar.x86_64",
"product": {
"name": "tini-0:0.16.1-1.el8ar.x86_64",
"product_id": "tini-0:0.16.1-1.el8ar.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-0:5.6.6-1.el8ar.x86_64",
"product": {
"name": "python3-psutil-0:5.6.6-1.el8ar.x86_64",
"product_id": "python3-psutil-0:5.6.6-1.el8ar.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"product": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"product": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-0:3.20.1-2.el8.x86_64",
"product": {
"name": "inotify-tools-0:3.20.1-2.el8.x86_64",
"product_id": "inotify-tools-0:3.20.1-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"product": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"product_id": "inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"product": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"product": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_id": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "haproxy20-0:2.0.16-3.el8.x86_64",
"product": {
"name": "haproxy20-0:2.0.16-3.el8.x86_64",
"product_id": "haproxy20-0:2.0.16-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20@2.0.16-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"product": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"product_id": "haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.16-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"product": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"product_id": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.16-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"product": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"product_id": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.4-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_id": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"product_id": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_id": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"product_id": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product_id": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"product": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"product": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"product": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_id": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn@4.5.0-2.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_id": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.5.0-2.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_id": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn-debuginfo@4.5.0-2.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_id": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.6.0-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_id": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.6.0-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_id": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.6.0-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-0:2020.5-4.el8.x86_64",
"product_id": "ostree-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-devel-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-devel-0:2020.5-4.el8.x86_64",
"product_id": "ostree-devel-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-devel@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-grub2-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-grub2-0:2020.5-4.el8.x86_64",
"product_id": "ostree-grub2-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-grub2@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-libs-0:2020.5-4.el8.x86_64",
"product_id": "ostree-libs-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-debugsource-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-debugsource-0:2020.5-4.el8.x86_64",
"product_id": "ostree-debugsource-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debugsource@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-debuginfo-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-debuginfo-0:2020.5-4.el8.x86_64",
"product_id": "ostree-debuginfo-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debuginfo@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"product": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"product_id": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.5-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-selftests-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.0-20.rhaos4.6.git97d715e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-20.rhaos4.6.git97d715e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_id": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-1.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202010022112.p0.git.94033.ef41184.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el7.x86_64",
"product": {
"name": "cri-tools-0:1.18.0-3.el7.x86_64",
"product_id": "cri-tools-0:1.18.0-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"product_id": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-0:5.9.2-5.el7.x86_64",
"product": {
"name": "oniguruma-0:5.9.2-5.el7.x86_64",
"product_id": "oniguruma-0:5.9.2-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma@5.9.2-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-devel-0:5.9.2-5.el7.x86_64",
"product": {
"name": "oniguruma-devel-0:5.9.2-5.el7.x86_64",
"product_id": "oniguruma-devel-0:5.9.2-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-devel@5.9.2-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"product": {
"name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"product_id": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oniguruma-debuginfo@5.9.2-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el7.x86_64",
"product": {
"name": "jq-0:1.6-2.el7.x86_64",
"product_id": "jq-0:1.6-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-devel-0:1.6-2.el7.x86_64",
"product": {
"name": "jq-devel-0:1.6-2.el7.x86_64",
"product_id": "jq-devel-0:1.6-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-devel@1.6-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jq-debuginfo-0:1.6-2.el7.x86_64",
"product": {
"name": "jq-debuginfo-0:1.6-2.el7.x86_64",
"product_id": "jq-debuginfo-0:1.6-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product": {
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product_id": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-113.rhaos4.6.git97d715e.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-113.rhaos4.6.git97d715e.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202010022112.p0.git.94033.ef41184.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libnftnl-0:1.1.5-4.el8.s390x",
"product": {
"name": "libnftnl-0:1.1.5-4.el8.s390x",
"product_id": "libnftnl-0:1.1.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnftnl-devel-0:1.1.5-4.el8.s390x",
"product": {
"name": "libnftnl-devel-0:1.1.5-4.el8.s390x",
"product_id": "libnftnl-devel-0:1.1.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"product": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"product_id": "libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"product": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-devel-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-devel-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-libs-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"product": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8%2B7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"product": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_id": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-8.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-3.el8.s390x",
"product": {
"name": "cri-tools-0:1.18.0-3.el8.s390x",
"product_id": "cri-tools-0:1.18.0-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"product_id": "cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"product_id": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-devel-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-devel-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-lite-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-static-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-static-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-static-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"product": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-cli-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-cli-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-devel-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-devel-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-devel-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-plugins-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.s390x",
"product_id": "python3-grpcio-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"product": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"product": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"product": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_id": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debugsource@2.18.1-12.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"product": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_id": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-altfiles-debuginfo@2.18.1-12.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-caps-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-caps-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-caps-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-caps@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-config-generic-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-config-generic-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-generic@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-config-rescue@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-live-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-live-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-live-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-live@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-network-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-network-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-network-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-network@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-squash-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-squash-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-squash-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-squash@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-tools-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-tools-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-tools-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-tools@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-debugsource-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-debugsource-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debugsource@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"product": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"product_id": "dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dracut-debuginfo@049-75.git20200422.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:46.82-2.el8.s390x",
"product": {
"name": "redhat-release-coreos-0:46.82-2.el8.s390x",
"product_id": "redhat-release-coreos-0:46.82-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"product": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-4.el8.s390x",
"product": {
"name": "faq-0:0.0.6-4.el8.s390x",
"product_id": "faq-0:0.0.6-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jq-0:1.6-2.el8.s390x",
"product": {
"name": "jq-0:1.6-2.el8.s390x",
"product_id": "jq-0:1.6-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jq-devel-0:1.6-2.el8.s390x",
"product": {
"name": "jq-devel-0:1.6-2.el8.s390x",
"product_id": "jq-devel-0:1.6-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jq-debugsource-0:1.6-2.el8.s390x",
"product": {
"name": "jq-debugsource-0:1.6-2.el8.s390x",
"product_id": "jq-debugsource-0:1.6-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "jq-debuginfo-0:1.6-2.el8.s390x",
"product": {
"name": "jq-debuginfo-0:1.6-2.el8.s390x",
"product_id": "jq-debuginfo-0:1.6-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-devel-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-devel-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-libs-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-libs-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-perl-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-perl-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-static-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-static-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-debugsource-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-15.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tini-0:0.16.1-1.el8ar.s390x",
"product": {
"name": "tini-0:0.16.1-1.el8ar.s390x",
"product_id": "tini-0:0.16.1-1.el8ar.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-0:5.6.6-1.el8ar.s390x",
"product": {
"name": "python3-psutil-0:5.6.6-1.el8ar.s390x",
"product_id": "python3-psutil-0:5.6.6-1.el8ar.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"product": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"product": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-0:3.20.1-2.el8.s390x",
"product": {
"name": "inotify-tools-0:3.20.1-2.el8.s390x",
"product_id": "inotify-tools-0:3.20.1-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-devel-0:3.20.1-2.el8.s390x",
"product": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.s390x",
"product_id": "inotify-tools-devel-0:3.20.1-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"product": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"product": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"product": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_id": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "haproxy20-0:2.0.16-3.el8.s390x",
"product": {
"name": "haproxy20-0:2.0.16-3.el8.s390x",
"product_id": "haproxy20-0:2.0.16-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20@2.0.16-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "haproxy-debugsource-0:2.0.16-3.el8.s390x",
"product": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.s390x",
"product_id": "haproxy-debugsource-0:2.0.16-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.16-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"product": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"product_id": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.16-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-devel-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-devel-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-libs-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"product": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"product_id": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.4-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_id": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"product_id": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_id": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"product_id": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product_id": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"product": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"product": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"product": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"product": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_id": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn@4.5.0-2.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"product": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_id": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.5.0-2.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"product": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_id": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/afterburn-debuginfo@4.5.0-2.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_id": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.6.0-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-0:2020.5-4.el8.s390x",
"product_id": "ostree-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-devel-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-devel-0:2020.5-4.el8.s390x",
"product_id": "ostree-devel-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-devel@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-libs-0:2020.5-4.el8.s390x",
"product_id": "ostree-libs-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-debugsource-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-debugsource-0:2020.5-4.el8.s390x",
"product_id": "ostree-debugsource-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debugsource@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-debuginfo-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-debuginfo-0:2020.5-4.el8.s390x",
"product_id": "ostree-debuginfo-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-debuginfo@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"product": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"product_id": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.5-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"product": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_id": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.0-20.rhaos4.6.git97d715e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-20.rhaos4.6.git97d715e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_id": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-1.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "s390utils-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-base@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cmsfs@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cmsfs-fuse@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cpacfstatsd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cpuplugd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-devel@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-hmcdrvfs@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-iucvterm@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-mon_statd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-osasnmpd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-zdsfs@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-ziomon@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-debugsource@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-base-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cmsfs-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cmsfs-fuse-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cpacfstatsd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-cpuplugd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-hmcdrvfs-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-iucvterm-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-mon_statd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-osasnmpd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-zdsfs-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product": {
"name": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_id": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/s390utils-ziomon-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src"
},
"product_reference": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64"
},
"product_reference": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src"
},
"product_reference": "cri-tools-0:1.18.0-3.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64"
},
"product_reference": "cri-tools-0:1.18.0-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src"
},
"product_reference": "jq-0:1.6-2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64"
},
"product_reference": "jq-0:1.6-2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debuginfo-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64"
},
"product_reference": "jq-debuginfo-0:1.6-2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-devel-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64"
},
"product_reference": "jq-devel-0:1.6-2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:5.9.2-5.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src"
},
"product_reference": "oniguruma-0:5.9.2-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64"
},
"product_reference": "oniguruma-0:5.9.2-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64"
},
"product_reference": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oniguruma-devel-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64"
},
"product_reference": "oniguruma-devel-0:5.9.2-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src"
},
"product_reference": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src"
},
"product_reference": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-boto3-0:1.4.0-1.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src"
},
"product_reference": "python-boto3-0:1.4.0-1.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-botocore-0:1.4.57-5.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src"
},
"product_reference": "python-botocore-0:1.4.57-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-s3transfer-0:0.1.3-1.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src"
},
"product_reference": "python-s3transfer-0:0.1.3-1.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-boto3-0:1.4.0-1.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch"
},
"product_reference": "python2-boto3-0:1.4.0-1.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-botocore-0:1.4.57-5.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch"
},
"product_reference": "python2-botocore-0:1.4.57-5.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-s3transfer-0:0.1.3-1.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch"
},
"product_reference": "python2-s3transfer-0:0.1.3-1.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-2:2.6.0-28.el8_2.2.src as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src"
},
"product_reference": "s390utils-2:2.6.0-28.el8_2.2.src",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-base-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8",
"product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x"
},
"product_reference": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-1:1.22.8-6.el8_2.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src"
},
"product_reference": "NetworkManager-1:1.22.8-6.el8_2.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch"
},
"product_reference": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch"
},
"product_reference": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch"
},
"product_reference": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le"
},
"product_reference": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x"
},
"product_reference": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64"
},
"product_reference": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x"
},
"product_reference": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64"
},
"product_reference": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x"
},
"product_reference": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64"
},
"product_reference": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch"
},
"product_reference": "ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-http-0:1.0.0-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src"
},
"product_reference": "ansible-runner-http-0:1.0.0-2.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src"
},
"product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64"
},
"product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch"
},
"product_reference": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src"
},
"product_reference": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch"
},
"product_reference": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch"
},
"product_reference": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch"
},
"product_reference": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src"
},
"product_reference": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src"
},
"product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64"
},
"product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64"
},
"product_reference": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64"
},
"product_reference": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x"
},
"product_reference": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64"
},
"product_reference": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le"
},
"product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x"
},
"product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src"
},
"product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64"
},
"product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le"
},
"product_reference": "cri-tools-0:1.18.0-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x"
},
"product_reference": "cri-tools-0:1.18.0-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src"
},
"product_reference": "cri-tools-0:1.18.0-3.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64"
},
"product_reference": "cri-tools-0:1.18.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:049-75.git20200422.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src"
},
"product_reference": "dracut-0:049-75.git20200422.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-caps-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-caps-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-caps-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-caps-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-config-generic-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-generic-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-debugsource-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-debugsource-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-live-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-live-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-live-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-live-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-live-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-live-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-network-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-network-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-network-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-network-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-squash-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-squash-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-squash-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-squash-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-squash-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-squash-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le"
},
"product_reference": "dracut-tools-0:049-75.git20200422.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x"
},
"product_reference": "dracut-tools-0:049-75.git20200422.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-tools-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64"
},
"product_reference": "dracut-tools-0:049-75.git20200422.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le"
},
"product_reference": "faq-0:0.0.6-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x"
},
"product_reference": "faq-0:0.0.6-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src"
},
"product_reference": "faq-0:0.0.6-4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64"
},
"product_reference": "faq-0:0.0.6-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-0:2.6.3-2.el8+7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src"
},
"product_reference": "gperftools-0:2.6.3-2.el8+7.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-devel-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-devel-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-libs-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le"
},
"product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x"
},
"product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64"
},
"product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-0:1.18.0-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src"
},
"product_reference": "grpc-0:1.18.0-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-cli-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-cli-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-devel-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-devel-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-plugins-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy-0:2.0.16-3.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src"
},
"product_reference": "haproxy-0:2.0.16-3.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le"
},
"product_reference": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x"
},
"product_reference": "haproxy-debugsource-0:2.0.16-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy-debugsource-0:2.0.16-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64"
},
"product_reference": "haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-0:2.0.16-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le"
},
"product_reference": "haproxy20-0:2.0.16-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-0:2.0.16-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x"
},
"product_reference": "haproxy20-0:2.0.16-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-0:2.0.16-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64"
},
"product_reference": "haproxy20-0:2.0.16-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le"
},
"product_reference": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x"
},
"product_reference": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64"
},
"product_reference": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src"
},
"product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le"
},
"product_reference": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x"
},
"product_reference": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64"
},
"product_reference": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le"
},
"product_reference": "inotify-tools-0:3.20.1-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x"
},
"product_reference": "inotify-tools-0:3.20.1-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-0:3.20.1-2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src"
},
"product_reference": "inotify-tools-0:3.20.1-2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64"
},
"product_reference": "inotify-tools-0:3.20.1-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le"
},
"product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x"
},
"product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64"
},
"product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le"
},
"product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x"
},
"product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64"
},
"product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le"
},
"product_reference": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x"
},
"product_reference": "inotify-tools-devel-0:3.20.1-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64"
},
"product_reference": "inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch"
},
"product_reference": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch"
},
"product_reference": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch"
},
"product_reference": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch"
},
"product_reference": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch"
},
"product_reference": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch"
},
"product_reference": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch"
},
"product_reference": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch"
},
"product_reference": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch"
},
"product_reference": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch"
},
"product_reference": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch"
},
"product_reference": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.235.5.1600670743-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch"
},
"product_reference": "jenkins-0:2.235.5.1600670743-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.235.5.1600670743-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src"
},
"product_reference": "jenkins-0:2.235.5.1600670743-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le"
},
"product_reference": "jq-0:1.6-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x"
},
"product_reference": "jq-0:1.6-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.src"
},
"product_reference": "jq-0:1.6-2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64"
},
"product_reference": "jq-0:1.6-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debuginfo-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le"
},
"product_reference": "jq-debuginfo-0:1.6-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debuginfo-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x"
},
"product_reference": "jq-debuginfo-0:1.6-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debuginfo-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64"
},
"product_reference": "jq-debuginfo-0:1.6-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debugsource-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le"
},
"product_reference": "jq-debugsource-0:1.6-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debugsource-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x"
},
"product_reference": "jq-debugsource-0:1.6-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-debugsource-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64"
},
"product_reference": "jq-debugsource-0:1.6-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-devel-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le"
},
"product_reference": "jq-devel-0:1.6-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-devel-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x"
},
"product_reference": "jq-devel-0:1.6-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jq-devel-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64"
},
"product_reference": "jq-devel-0:1.6-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch"
},
"product_reference": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le"
},
"product_reference": "libnftnl-0:1.1.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x"
},
"product_reference": "libnftnl-0:1.1.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-0:1.1.5-4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src"
},
"product_reference": "libnftnl-0:1.1.5-4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64"
},
"product_reference": "libnftnl-0:1.1.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le"
},
"product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x"
},
"product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64"
},
"product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le"
},
"product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x"
},
"product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64"
},
"product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le"
},
"product_reference": "libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-devel-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x"
},
"product_reference": "libnftnl-devel-0:1.1.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnftnl-devel-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64"
},
"product_reference": "libnftnl-devel-0:1.1.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-0:1.0.16-4.5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src"
},
"product_reference": "libsodium-0:1.0.16-4.5.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le"
},
"product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x"
},
"product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64"
},
"product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le"
},
"product_reference": "libunwind-0:1.2.1-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-0:1.2.1-5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src"
},
"product_reference": "libunwind-0:1.2.1-5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64"
},
"product_reference": "libunwind-0:1.2.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le"
},
"product_reference": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64"
},
"product_reference": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le"
},
"product_reference": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64"
},
"product_reference": "libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-devel-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le"
},
"product_reference": "libunwind-devel-0:1.2.1-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libunwind-devel-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64"
},
"product_reference": "libunwind-devel-0:1.2.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch"
},
"product_reference": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src"
},
"product_reference": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le"
},
"product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x"
},
"product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src"
},
"product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64"
},
"product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le"
},
"product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x"
},
"product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src"
},
"product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64"
},
"product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le"
},
"product_reference": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x"
},
"product_reference": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64"
},
"product_reference": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le"
},
"product_reference": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x"
},
"product_reference": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64"
},
"product_reference": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src"
},
"product_reference": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src"
},
"product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src"
},
"product_reference": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-15.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src"
},
"product_reference": "openssl-1:1.1.1c-15.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-devel-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-libs-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-perl-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le"
},
"product_reference": "openssl-static-1:1.1.1c-15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x"
},
"product_reference": "openssl-static-1:1.1.1c-15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64"
},
"product_reference": "openssl-static-1:1.1.1c-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src"
},
"product_reference": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch"
},
"product_reference": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch"
},
"product_reference": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch"
},
"product_reference": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src"
},
"product_reference": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch"
},
"product_reference": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src"
},
"product_reference": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src"
},
"product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch"
},
"product_reference": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-0:2020.5-4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src"
},
"product_reference": "ostree-0:2020.5-4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debuginfo-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debuginfo-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-debuginfo-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debuginfo-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-debuginfo-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debugsource-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-debugsource-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debugsource-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-debugsource-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-debugsource-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-debugsource-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-devel-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-devel-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-devel-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-devel-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-devel-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-devel-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-grub2-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-grub2-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-grub2-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-grub2-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-libs-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-libs-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-libs-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le"
},
"product_reference": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x"
},
"product_reference": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64"
},
"product_reference": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src"
},
"product_reference": "ovn2.13-0:20.09.0-1.el8fdp.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le"
},
"product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x"
},
"product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64"
},
"product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pprof-0:2.6.3-2.el8+7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch"
},
"product_reference": "pprof-0:2.6.3-2.el8+7.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le"
},
"product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x"
},
"product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64"
},
"product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-0:3.6.1-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src"
},
"product_reference": "protobuf-0:3.6.1-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-devel-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-lite-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le"
},
"product_reference": "protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-static-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x"
},
"product_reference": "protobuf-static-0:3.6.1-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-static-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64"
},
"product_reference": "protobuf-static-0:3.6.1-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-vim-0:3.6.1-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch"
},
"product_reference": "protobuf-vim-0:3.6.1-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-alembic-0:1.4.2-5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src"
},
"product_reference": "python-alembic-0:1.4.2-5.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-boto3-0:1.9.101-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src"
},
"product_reference": "python-boto3-0:1.9.101-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-botocore-0:1.12.119-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src"
},
"product_reference": "python-botocore-0:1.12.119-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cachetools-0:3.1.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src"
},
"product_reference": "python-cachetools-0:3.1.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-certifi-0:2018.10.15-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src"
},
"product_reference": "python-certifi-0:2018.10.15-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-construct-0:2.10.56-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src"
},
"product_reference": "python-construct-0:2.10.56-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-daemon-0:2.1.2-9.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src"
},
"product_reference": "python-daemon-0:2.1.2-9.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-dictdiffer-0:0.7.1-2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src"
},
"product_reference": "python-dictdiffer-0:0.7.1-2.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-flask-1:1.1.1-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src"
},
"product_reference": "python-flask-1:1.1.1-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-flask-doc-1:1.1.1-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch"
},
"product_reference": "python-flask-doc-1:1.1.1-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-google-auth-0:1.3.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src"
},
"product_reference": "python-google-auth-0:1.3.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ifaddr-0:0.1.6-5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src"
},
"product_reference": "python-ifaddr-0:0.1.6-5.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src"
},
"product_reference": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src"
},
"product_reference": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-kubernetes-0:11.0.0-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src"
},
"product_reference": "python-kubernetes-0:11.0.0-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src"
},
"product_reference": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lockfile-1:0.11.0-8.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src"
},
"product_reference": "python-lockfile-1:0.11.0-8.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-openshift-1:0.11.2-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src"
},
"product_reference": "python-openshift-1:0.11.2-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src"
},
"product_reference": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src"
},
"product_reference": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch"
},
"product_reference": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src"
},
"product_reference": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch"
},
"product_reference": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pbr-0:5.4.3-2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src"
},
"product_reference": "python-pbr-0:5.4.3-2.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pexpect-0:4.6-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src"
},
"product_reference": "python-pexpect-0:4.6-2.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.6.6-1.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src"
},
"product_reference": "python-psutil-0:5.6.6-1.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le"
},
"product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x"
},
"product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64"
},
"product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pyroute2-0:0.5.3-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src"
},
"product_reference": "python-pyroute2-0:0.5.3-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src"
},
"product_reference": "python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rsa-0:4.6-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src"
},
"product_reference": "python-rsa-0:4.6-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src"
},
"product_reference": "python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le"
},
"product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x"
},
"product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64"
},
"product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-s3transfer-0:0.2.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src"
},
"product_reference": "python-s3transfer-0:0.2.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-string_utils-0:0.6.0-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src"
},
"product_reference": "python-string_utils-0:0.6.0-4.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src"
},
"product_reference": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src"
},
"product_reference": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tenacity-0:6.2.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src"
},
"product_reference": "python-tenacity-0:6.2.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src"
},
"product_reference": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-websocket-client-0:0.54.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src"
},
"product_reference": "python-websocket-client-0:0.54.0-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-werkzeug-0:1.0.1-3.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src"
},
"product_reference": "python-werkzeug-0:1.0.1-3.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-zeroconf-0:0.24.4-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src"
},
"product_reference": "python-zeroconf-0:0.24.4-1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-botocore-0:1.12.119-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch"
},
"product_reference": "python2-botocore-0:1.12.119-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-cachetools-0:3.1.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch"
},
"product_reference": "python2-cachetools-0:3.1.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-alembic-0:1.4.2-5.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch"
},
"product_reference": "python3-alembic-0:1.4.2-5.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-boto3-0:1.9.101-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch"
},
"product_reference": "python3-boto3-0:1.9.101-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-botocore-0:1.12.119-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch"
},
"product_reference": "python3-botocore-0:1.12.119-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-cachetools-0:3.1.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch"
},
"product_reference": "python3-cachetools-0:3.1.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-certifi-0:2018.10.15-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch"
},
"product_reference": "python3-certifi-0:2018.10.15-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-construct-0:2.10.56-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch"
},
"product_reference": "python3-construct-0:2.10.56-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-daemon-0:2.1.2-9.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch"
},
"product_reference": "python3-daemon-0:2.1.2-9.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch"
},
"product_reference": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-flask-1:1.1.1-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch"
},
"product_reference": "python3-flask-1:1.1.1-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-google-auth-0:1.3.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch"
},
"product_reference": "python3-google-auth-0:1.3.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "python3-grpcio-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le"
},
"product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x"
},
"product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64"
},
"product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch"
},
"product_reference": "python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch"
},
"product_reference": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch"
},
"product_reference": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch"
},
"product_reference": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch"
},
"product_reference": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch"
},
"product_reference": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kubernetes-0:11.0.0-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch"
},
"product_reference": "python3-kubernetes-0:11.0.0-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch"
},
"product_reference": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch"
},
"product_reference": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch"
},
"product_reference": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-lockfile-1:0.11.0-8.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch"
},
"product_reference": "python3-lockfile-1:0.11.0-8.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openshift-1:0.11.2-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch"
},
"product_reference": "python3-openshift-1:0.11.2-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch"
},
"product_reference": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch"
},
"product_reference": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le"
},
"product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x"
},
"product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64"
},
"product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch"
},
"product_reference": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch"
},
"product_reference": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch"
},
"product_reference": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch"
},
"product_reference": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-pbr-0:5.4.3-2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch"
},
"product_reference": "python3-pbr-0:5.4.3-2.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-pexpect-0:4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch"
},
"product_reference": "python3-pexpect-0:4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-protobuf-0:3.6.1-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch"
},
"product_reference": "python3-protobuf-0:3.6.1-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le"
},
"product_reference": "python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x"
},
"product_reference": "python3-psutil-0:5.6.6-1.el8ar.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64"
},
"product_reference": "python3-psutil-0:5.6.6-1.el8ar.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le"
},
"product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x"
},
"product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64"
},
"product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-pyroute2-0:0.5.3-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch"
},
"product_reference": "python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch"
},
"product_reference": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rsa-0:4.6-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch"
},
"product_reference": "python3-rsa-0:4.6-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le"
},
"product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x"
},
"product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64"
},
"product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le"
},
"product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x"
},
"product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64"
},
"product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch"
},
"product_reference": "python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-string_utils-0:0.6.0-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch"
},
"product_reference": "python3-string_utils-0:0.6.0-4.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch"
},
"product_reference": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch"
},
"product_reference": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch"
},
"product_reference": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch"
},
"product_reference": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tenacity-0:6.2.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch"
},
"product_reference": "python3-tenacity-0:6.2.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch"
},
"product_reference": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch"
},
"product_reference": "python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch"
},
"product_reference": "python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch"
},
"product_reference": "python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:46.82-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le"
},
"product_reference": "redhat-release-coreos-0:46.82-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:46.82-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x"
},
"product_reference": "redhat-release-coreos-0:46.82-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:46.82-2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src"
},
"product_reference": "redhat-release-coreos-0:46.82-2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:46.82-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64"
},
"product_reference": "redhat-release-coreos-0:46.82-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch"
},
"product_reference": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src"
},
"product_reference": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src"
},
"product_reference": "rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch"
},
"product_reference": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-0:2020.4-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src"
},
"product_reference": "rpm-ostree-0:2020.4-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-devel-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-devel-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-libs-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le"
},
"product_reference": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x"
},
"product_reference": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64"
},
"product_reference": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src"
},
"product_reference": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x"
},
"product_reference": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64"
},
"product_reference": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.16.1-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le"
},
"product_reference": "tini-0:0.16.1-1.el8ar.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.16.1-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x"
},
"product_reference": "tini-0:0.16.1-1.el8ar.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.16.1-1.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src"
},
"product_reference": "tini-0:0.16.1-1.el8ar.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.16.1-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64"
},
"product_reference": "tini-0:0.16.1-1.el8ar.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch"
},
"product_reference": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.8-1.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
},
"product_reference": "toolbox-0:0.0.8-1.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the Kubernetes Product Security Committee"
]
},
{
"names": [
"Wouter ter Maat"
],
"organization": "Offensi",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-8559",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"discovery_date": "2020-06-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1851422"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Kubernetes API server, where it allows an attacker to escalate their privileges from a compromised node. This flaw allows an attacker who can intercept requests on a compromised node, to redirect those requests, along with their credentials, to perform actions on other endpoints that trust those credentials (including other clusters), allowing for escalation of privileges. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kubernetes: compromised node could escalate to cluster level privileges",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Kubernetes is embedded in the version of heketi shipped with Red Hat Gluster Storage 3. However, it does not use Kubernetes API server part and only uses client side bits. Hence, this flaw does not affect heketi.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8559"
},
{
"category": "external",
"summary": "RHBZ#1851422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851422"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8559"
},
{
"category": "external",
"summary": "https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs",
"url": "https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs"
}
],
"release_date": "2020-07-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:47:06+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4197"
},
{
"category": "workaround",
"details": "No mitigation is known.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kubernetes: compromised node could escalate to cluster level privileges"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:47:06+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4197"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:47:06+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4197"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src",
"7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src",
"7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src",
"7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src",
"7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64",
"7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src",
"7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src",
"7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src",
"7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src",
"8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x",
"8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch",
"8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x",
"8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src",
"8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src",
"8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x",
"8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src",
"8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x",
"8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src",
"8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src",
"8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x",
"8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src",
"8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src",
"8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x",
"8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src",
"8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x",
"8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64",
"8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch",
"8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.src",
"8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x",
"8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src",
"8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x",
"8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src",
"8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x",
"8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src",
"8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le",
"8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch",
"8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src",
"8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src",
"8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src",
"8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x",
"8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64",
"8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src",
"8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src",
"8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src",
"8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x",
"8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src",
"8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x",
"8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x",
"8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src",
"8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x",
"8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64",
"8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src",
"8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src",
"8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src",
"8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src",
"8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src",
"8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src",
"8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src",
"8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src",
"8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src",
"8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src",
"8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src",
"8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src",
"8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src",
"8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src",
"8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src",
"8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src",
"8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src",
"8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src",
"8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src",
"8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src",
"8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src",
"8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src",
"8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src",
"8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src",
"8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src",
"8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch",
"8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch",
"8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch",
"8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch",
"8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x",
"8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64",
"8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch",
"8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch",
"8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x",
"8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64",
"8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch",
"8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x",
"8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64",
"8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch",
"8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch",
"8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch",
"8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch",
"8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src",
"8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch",
"8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src",
"8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src",
"8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x",
"8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src",
"8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2020:3665
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:3665",
"url": "https://access.redhat.com/errata/RHSA-2020:3665"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3665.json"
}
],
"title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
"tracking": {
"current_release_date": "2025-11-07T15:51:49+00:00",
"generator": {
"date": "2025-11-07T15:51:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:3665",
"initial_release_date": "2020-09-08T10:05:46+00:00",
"revision_history": [
{
"date": "2020-09-08T10:05:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-09-08T10:05:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T15:51:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"product": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src (go-toolset:rhel8)",
"product_id": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=src\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=src\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src (go-toolset:rhel8)",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=src\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8)",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product": {
"name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8)",
"product_id": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product": {
"name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8)",
"product_id": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product": {
"name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8)",
"product_id": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product": {
"name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8)",
"product_id": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x (go-toolset:rhel8)",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le (go-toolset:rhel8)",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 (go-toolset:rhel8)",
"product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8020020200817154239:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-08T10:05:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:3665"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-08T10:05:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:3665"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-08T10:05:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:3665"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.MAIN.EUS:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2020:5606
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for mcg is now available for Red Hat OpenShift Container Storage 4.6.0 on RHEL-8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nThese updated packages include numerous security fixes, bug fixes, and\nenhancements.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThese updated packages include numerous bug fixes and enhancements. Users are\ndirected to the Red Hat OpenShift Container Storage Release Notes for\ninformation on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.6/html/4.6_release_notes/index\n\nAll Red Hat OpenShift Container Storage users are advised to upgrade to these\nupdated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5606",
"url": "https://access.redhat.com/errata/RHSA-2020:5606"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5606.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6 bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-11-07T15:51:57+00:00",
"generator": {
"date": "2025-11-07T15:51:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:5606",
"initial_release_date": "2020-12-17T05:43:57+00:00",
"revision_history": [
{
"date": "2020-12-17T05:43:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-17T05:43:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T15:51:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product": {
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_container_storage:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Container Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "tini-0:0.18.0-5.el8.src",
"product": {
"name": "tini-0:0.18.0-5.el8.src",
"product_id": "tini-0:0.18.0-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"product": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tini-0:0.18.0-5.el8.x86_64",
"product": {
"name": "tini-0:0.18.0-5.el8.x86_64",
"product_id": "tini-0:0.18.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"product": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tini-0:0.18.0-5.el8.s390x",
"product": {
"name": "tini-0:0.18.0-5.el8.s390x",
"product_id": "tini-0:0.18.0-5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"product": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tini-0:0.18.0-5.el8.ppc64le",
"product": {
"name": "tini-0:0.18.0-5.el8.ppc64le",
"product_id": "tini-0:0.18.0-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"product": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le"
},
"product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x"
},
"product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src"
},
"product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
},
"product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.18.0-5.el8.ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le"
},
"product_reference": "tini-0:0.18.0-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.18.0-5.el8.s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x"
},
"product_reference": "tini-0:0.18.0-5.el8.s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.18.0-5.el8.src as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src"
},
"product_reference": "tini-0:0.18.0-5.el8.src",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tini-0:0.18.0-5.el8.x86_64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
},
"product_reference": "tini-0:0.18.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T05:43:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5606"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T05:43:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5606"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T05:43:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5606"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src",
"8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src",
"8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhba-2020_4139
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for 3scale-istio-adapter-rhel8-container is now available for OpenShift Service Mesh.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThe OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html\n\nThis advisory covers the containers for the release.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:4139",
"url": "https://access.redhat.com/errata/RHBA-2020:4139"
},
{
"category": "external",
"summary": "MAISTRA-1854",
"url": "https://issues.redhat.com/browse/MAISTRA-1854"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_4139.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Service Mesh 3scale-istio-adapter-rhel8-container update",
"tracking": {
"current_release_date": "2024-11-13T22:06:58+00:00",
"generator": {
"date": "2024-11-13T22:06:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHBA-2020:4139",
"initial_release_date": "2020-09-30T14:15:38+00:00",
"revision_history": [
{
"date": "2020-09-30T14:15:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-09-30T14:15:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:06:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Service Mesh 1.0",
"product": {
"name": "OpenShift Service Mesh 1.0",
"product_id": "8Base-OSSM-1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:1.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64",
"product": {
"name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64",
"product_id": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64",
"product_identification_helper": {
"purl": "pkg:oci/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/3scale-istio-adapter-rhel8\u0026tag=1.0.0-9"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64 as a component of OpenShift Service Mesh 1.0",
"product_id": "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
},
"product_reference": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64",
"relates_to_product_reference": "8Base-OSSM-1.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-30T14:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4139"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-09-30T14:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4139"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021_2122
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.7.13 is now available with updates to packages and images that fix several bugs.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.13. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2021:2121\n\nSecurity Fix(es):\n\n* jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks. (CVE-2021-21642)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints. (CVE-2021-21643)\n\n* jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. (CVE-2021-21644)\n\n* jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints. (CVE-2021-21645)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2122",
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1952146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952146"
},
{
"category": "external",
"summary": "1952148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952148"
},
{
"category": "external",
"summary": "1952151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952151"
},
{
"category": "external",
"summary": "1952152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952152"
},
{
"category": "external",
"summary": "1964770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964770"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2122.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.7.13 packages and security update",
"tracking": {
"current_release_date": "2024-11-22T17:00:56+00:00",
"generator": {
"date": "2024-11-22T17:00:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2122",
"initial_release_date": "2021-06-01T04:12:55+00:00",
"revision_history": [
{
"date": "2021-06-01T04:12:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-06-01T04:12:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T17:00:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.7",
"product": {
"name": "Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.7::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.7",
"product": {
"name": "Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.7::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:47.83-2.el8.src",
"product": {
"name": "redhat-release-coreos-0:47.83-2.el8.src",
"product_id": "redhat-release-coreos-0:47.83-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.7.1621361158-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.20.0-3.el7.src",
"product": {
"name": "cri-tools-0:1.20.0-3.el7.src",
"product_id": "cri-tools-0:1.20.0-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.20.0-3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:47.83-2.el8.x86_64",
"product": {
"name": "redhat-release-coreos-0:47.83-2.el8.x86_64",
"product_id": "redhat-release-coreos-0:47.83-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.20.0-3.el7.x86_64",
"product": {
"name": "cri-tools-0:1.20.0-3.el7.x86_64",
"product_id": "cri-tools-0:1.20.0-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.20.0-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"product_id": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.20.0-3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:47.83-2.el8.ppc64le",
"product": {
"name": "redhat-release-coreos-0:47.83-2.el8.ppc64le",
"product_id": "redhat-release-coreos-0:47.83-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_id": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:47.83-2.el8.s390x",
"product": {
"name": "redhat-release-coreos-0:47.83-2.el8.s390x",
"product_id": "redhat-release-coreos-0:47.83-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.7.1621361158-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.20.0-3.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src"
},
"product_reference": "cri-tools-0:1.20.0-3.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.20.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64"
},
"product_reference": "cri-tools-0:1.20.0-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:47.83-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le"
},
"product_reference": "redhat-release-coreos-0:47.83-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:47.83-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x"
},
"product_reference": "redhat-release-coreos-0:47.83-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:47.83-2.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src"
},
"product_reference": "redhat-release-coreos-0:47.83-2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:47.83-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
},
"product_reference": "redhat-release-coreos-0:47.83-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2021-21642",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2021-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1952146"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the config-file-provider Jenkins plugin. The plugin XML parser wasn\u0027t configure to prevent XML external entity (XXE) attacks. An attacker with the ability to define Maven configuration files can use this vulnerability to prepare a crafted configuration file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21642"
},
{
"category": "external",
"summary": "RHBZ#1952146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21642"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21642",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21642"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2204",
"url": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2204"
}
],
"release_date": "2021-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks."
},
{
"cve": "CVE-2021-21643",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2021-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1952148"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the config-file-provider Jenkins plugin. The plugin does not correctly perform permission checks in several HTTP endpoints, as a consequence an attacker with global Job/Configure permission can enumerate system-scoped credentials IDs of credentials stored in Jenkins.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21643"
},
{
"category": "external",
"summary": "RHBZ#1952148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21643"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21643",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21643"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2254",
"url": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2254"
}
],
"release_date": "2021-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints."
},
{
"cve": "CVE-2021-21644",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"discovery_date": "2021-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1952151"
}
],
"notes": [
{
"category": "description",
"text": "A cross-site request forgery (CSRF) vulnerability was found in the config-file-provider Jenkins plugin. The plugin does not require POST requests for an HTTP endpoint which allows attackers to delete configuration files corresponding to an attacker-specified ID.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21644"
},
{
"category": "external",
"summary": "RHBZ#1952151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21644"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21644",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21644"
}
],
"release_date": "2021-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability."
},
{
"cve": "CVE-2021-21645",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2021-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1952152"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the config-file-provider Jenkins plugin. The plugin does not perform permission checks in several HTTP endpoints, as a consequence an attacker with Overall/Read permission is allowed to enumerate configuration file IDs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21645"
},
{
"category": "external",
"summary": "RHBZ#1952152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952152"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21645"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21645",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21645"
}
],
"release_date": "2021-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints."
}
]
}
rhsa-2020_5159
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for faq is now available for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nSecurity Fix(es):\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5159",
"url": "https://access.redhat.com/errata/RHSA-2020:5159"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5159.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.6 security update",
"tracking": {
"current_release_date": "2024-11-13T22:17:29+00:00",
"generator": {
"date": "2024-11-13T22:17:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2020:5159",
"initial_release_date": "2020-11-30T15:06:10+00:00",
"revision_history": [
{
"date": "2020-11-30T15:06:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-13T06:09:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:17:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el8.s390x",
"product": {
"name": "faq-0:0.0.6-5.el8.s390x",
"product_id": "faq-0:0.0.6-5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el8.ppc64le",
"product": {
"name": "faq-0:0.0.6-5.el8.ppc64le",
"product_id": "faq-0:0.0.6-5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el8.x86_64",
"product": {
"name": "faq-0:0.0.6-5.el8.x86_64",
"product_id": "faq-0:0.0.6-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el8.src",
"product": {
"name": "faq-0:0.0.6-5.el8.src",
"product_id": "faq-0:0.0.6-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.ppc64le"
},
"product_reference": "faq-0:0.0.6-5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.s390x"
},
"product_reference": "faq-0:0.0.6-5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.src"
},
"product_reference": "faq-0:0.0.6-5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.x86_64"
},
"product_reference": "faq-0:0.0.6-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-30T15:06:10+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5159"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.ppc64le",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.s390x",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.src",
"8Base-RHOSE-4.6:faq-0:0.0.6-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021_4103
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.9.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform. \n\nThis advisory contains OpenShift Virtualization 4.9.0 RPMs.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4103",
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1918750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750"
},
{
"category": "external",
"summary": "1958341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341"
},
{
"category": "external",
"summary": "1981345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981345"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4103.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.9.0 RPMs security and bug fix update",
"tracking": {
"current_release_date": "2024-12-20T20:35:43+00:00",
"generator": {
"date": "2024-12-20T20:35:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2021:4103",
"initial_release_date": "2021-11-02T17:36:11+00:00",
"revision_history": [
{
"date": "2021-11-02T17:36:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-02T17:36:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-20T20:35:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.9 for RHEL 7",
"product": {
"name": "CNV 4.9 for RHEL 7",
"product_id": "7Server-CNV-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.9::el7"
}
}
},
{
"category": "product_name",
"name": "CNV 4.9 for RHEL 8",
"product": {
"name": "CNV 4.9 for RHEL 8",
"product_id": "8Base-CNV-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.9::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-0:4.9.0-287.el7.src",
"product": {
"name": "kubevirt-0:4.9.0-287.el7.src",
"product_id": "kubevirt-0:4.9.0-287.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.9.0-287.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kubevirt-0:4.9.0-287.el8.src",
"product": {
"name": "kubevirt-0:4.9.0-287.el8.src",
"product_id": "kubevirt-0:4.9.0-287.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.9.0-287.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"product_id": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.9.0-287.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.9.0-287.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"product_id": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.9.0-287.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.9.0-287.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.9.0-287.el7.src as a component of CNV 4.9 for RHEL 7",
"product_id": "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src"
},
"product_reference": "kubevirt-0:4.9.0-287.el7.src",
"relates_to_product_reference": "7Server-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64 as a component of CNV 4.9 for RHEL 7",
"product_id": "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64 as a component of CNV 4.9 for RHEL 7",
"product_id": "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.9.0-287.el8.src as a component of CNV 4.9 for RHEL 8",
"product_id": "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src"
},
"product_reference": "kubevirt-0:4.9.0-287.el8.src",
"relates_to_product_reference": "8Base-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64 as a component of CNV 4.9 for RHEL 8",
"product_id": "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64 as a component of CNV 4.9 for RHEL 8",
"product_id": "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-02T17:36:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-02T17:36:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2021-3114",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1918750"
}
],
"notes": [
{
"category": "description",
"text": "A flaw detected in golang: crypto/elliptic, in which P-224 keys as generated can return incorrect inputs, reducing the strength of the cryptography. The highest threat from this vulnerability is confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/elliptic: incorrect operations on the P-224 curve",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3114"
},
{
"category": "external",
"summary": "RHBZ#1918750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/mperVMGa98w",
"url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w"
}
],
"release_date": "2021-01-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-02T17:36:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/elliptic: incorrect operations on the P-224 curve"
},
{
"cve": "CVE-2021-31525",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1958341"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31525"
},
{
"category": "external",
"summary": "RHBZ#1958341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc",
"url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc"
}
],
"release_date": "2021-04-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-02T17:36:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header"
}
]
}
rhba-2020:5356
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.23 is now available with\nupdates to packages and images that fix several bugs.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.5.23. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHSA-2020:5359\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:5356",
"url": "https://access.redhat.com/errata/RHBA-2020:5356"
},
{
"category": "external",
"summary": "1905005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905005"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_5356.json"
}
],
"title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.23 packages update",
"tracking": {
"current_release_date": "2025-11-06T23:51:28+00:00",
"generator": {
"date": "2025-11-06T23:51:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHBA-2020:5356",
"initial_release_date": "2020-12-15T19:37:22+00:00",
"revision_history": [
{
"date": "2020-12-15T19:37:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-15T19:37:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:51:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"product": {
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"product_id": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"product": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"product": {
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"product_id": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"product": {
"name": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"product_id": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"product": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"product": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"product": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src"
},
"product_reference": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le"
},
"product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x"
},
"product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src"
},
"product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
},
"product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src"
},
"product_reference": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src"
},
"product_reference": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-15T19:37:22+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:5356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-15T19:37:22+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:5356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhba-2021_0075
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Jaeger 1.17.8.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Jaeger provides these changes:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2021:0075",
"url": "https://access.redhat.com/errata/RHBA-2021:0075"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_0075.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Jaeger 1.17.8 Operator/Operand Containers",
"tracking": {
"current_release_date": "2024-11-13T22:07:36+00:00",
"generator": {
"date": "2024-11-13T22:07:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHBA-2021:0075",
"initial_release_date": "2021-01-12T09:34:21+00:00",
"revision_history": [
{
"date": "2021-01-12T09:34:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-12T09:34:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:07:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Jaeger 1.17",
"product": {
"name": "Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jaeger:1.17::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Jaeger"
},
{
"branches": [
{
"category": "product_version",
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"product": {
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.17.8-12"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"product": {
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.17.8-12"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"product": {
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.17.8-10"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"product": {
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.17.8-11"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"product": {
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.17.8-9"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"product": {
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.17.8-12"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"product": {
"name": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"product_id": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.17.8-10"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64",
"product": {
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64",
"product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.17.8-11"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64"
},
"product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64"
},
"product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64"
},
"product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64"
},
"product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64"
},
"product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64"
},
"product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64"
},
"product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
},
"product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-12T09:34:21+00:00",
"details": "Red Hat OpenShift Jaeger Release",
"product_ids": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-12T09:34:21+00:00",
"details": "Red Hat OpenShift Jaeger Release",
"product_ids": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021:0713
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.34 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release also includes a security update for Red Hat OpenShift Container Platform 4.5.\n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.5.34. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2021:0714\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0713",
"url": "https://access.redhat.com/errata/RHSA-2021:0713"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1934454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934454"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0713.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.34 packages and security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:51+00:00",
"generator": {
"date": "2025-11-06T23:52:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:0713",
"initial_release_date": "2021-03-11T04:48:46+00:00",
"revision_history": [
{
"date": "2021-03-11T04:48:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-03-11T04:48:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"product": {
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"product_id": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el8.src",
"product": {
"name": "cri-tools-0:1.18.0-4.el8.src",
"product_id": "cri-tools-0:1.18.0-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.src",
"product": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.src",
"product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "apb-0:2.0.3-3.el7.src",
"product": {
"name": "apb-0:2.0.3-3.el7.src",
"product_id": "apb-0:2.0.3-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el7.src",
"product": {
"name": "cri-tools-0:1.18.0-4.el7.src",
"product_id": "cri-tools-0:1.18.0-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"product": {
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"product_id": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el8.x86_64",
"product": {
"name": "cri-tools-0:1.18.0-4.el8.x86_64",
"product_id": "cri-tools-0:1.18.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"product_id": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "apb-0:2.0.3-3.el7.x86_64",
"product": {
"name": "apb-0:2.0.3-3.el7.x86_64",
"product_id": "apb-0:2.0.3-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el7.x86_64",
"product": {
"name": "cri-tools-0:1.18.0-4.el7.x86_64",
"product_id": "cri-tools-0:1.18.0-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el8.ppc64le",
"product": {
"name": "cri-tools-0:1.18.0-4.el8.ppc64le",
"product_id": "cri-tools-0:1.18.0-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"product_id": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "apb-0:2.0.3-3.el7.ppc64le",
"product": {
"name": "apb-0:2.0.3-3.el7.ppc64le",
"product_id": "apb-0:2.0.3-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el7.ppc64le",
"product": {
"name": "cri-tools-0:1.18.0-4.el7.ppc64le",
"product_id": "cri-tools-0:1.18.0-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_id": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el8.s390x",
"product": {
"name": "cri-tools-0:1.18.0-4.el8.s390x",
"product_id": "cri-tools-0:1.18.0-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"product_id": "cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "apb-0:2.0.3-3.el7.s390x",
"product": {
"name": "apb-0:2.0.3-3.el7.s390x",
"product_id": "apb-0:2.0.3-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el7.s390x",
"product": {
"name": "cri-tools-0:1.18.0-4.el7.s390x",
"product_id": "cri-tools-0:1.18.0-4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apb-container-scripts-0:2.0.3-3.el7.noarch",
"product": {
"name": "apb-container-scripts-0:2.0.3-3.el7.noarch",
"product_id": "apb-container-scripts-0:2.0.3-3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb-container-scripts@2.0.3-3.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apb-devel-0:2.0.3-3.el7.noarch",
"product": {
"name": "apb-devel-0:2.0.3-3.el7.noarch",
"product_id": "apb-devel-0:2.0.3-3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb-devel@2.0.3-3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-0:2.0.3-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le"
},
"product_reference": "apb-0:2.0.3-3.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-0:2.0.3-3.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x"
},
"product_reference": "apb-0:2.0.3-3.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-0:2.0.3-3.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src"
},
"product_reference": "apb-0:2.0.3-3.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-0:2.0.3-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64"
},
"product_reference": "apb-0:2.0.3-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-container-scripts-0:2.0.3-3.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch"
},
"product_reference": "apb-container-scripts-0:2.0.3-3.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-devel-0:2.0.3-3.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch"
},
"product_reference": "apb-devel-0:2.0.3-3.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le"
},
"product_reference": "cri-tools-0:1.18.0-4.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x"
},
"product_reference": "cri-tools-0:1.18.0-4.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src"
},
"product_reference": "cri-tools-0:1.18.0-4.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64"
},
"product_reference": "cri-tools-0:1.18.0-4.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src"
},
"product_reference": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src"
},
"product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le"
},
"product_reference": "cri-tools-0:1.18.0-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x"
},
"product_reference": "cri-tools-0:1.18.0-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src"
},
"product_reference": "cri-tools-0:1.18.0-4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64"
},
"product_reference": "cri-tools-0:1.18.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src"
},
"product_reference": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-11T04:48:46+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-11T04:48:46+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2020_4214
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for go-toolset-1.13 and go-toolset-1.13-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* net/http, x/net/http2: http server shutdown doesn\u0027t gracefully shut down HTTP2 connections (BZ#1879236)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:4214",
"url": "https://access.redhat.com/errata/RHSA-2020:4214"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.13_toolset/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.13_toolset/"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4214.json"
}
],
"title": "Red Hat Security Advisory: go-toolset-1.13-golang security and bug fix update",
"tracking": {
"current_release_date": "2025-01-06T18:48:48+00:00",
"generator": {
"date": "2025-01-06T18:48:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2020:4214",
"initial_release_date": "2020-10-08T10:52:13+00:00",
"revision_history": [
{
"date": "2020-10-08T10:52:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-08T10:52:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T18:48:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:devtools:2020"
}
}
},
{
"category": "product_name",
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:devtools:2020"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Tools"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"product": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"product_id": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"product": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"product": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-race@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"product": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-0:1.13.15-1.el7.src",
"product": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.src",
"product_id": "go-toolset-1.13-0:1.13.15-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"product": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"product_id": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"product": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"product": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"product_id": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"product": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"product": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"product": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"product": {
"name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"product_id": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.13-golang-docs@1.13.15-3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.src",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch"
},
"product_reference": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Server-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.src",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch"
},
"product_reference": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64"
},
"product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
},
"product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2020.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-08T10:52:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4214"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-08T10:52:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4214"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-08T10:52:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4214"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x",
"7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2020:5119
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.20 is now available with updates to packages and images that fix several bugs.\n\nThis release also includes a security update for golang for Red Hat OpenShift Container Platform 4.5.20.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nSecurity Fix(es):\n\n* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.5.20. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2020:5118\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.[y]/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5119",
"url": "https://access.redhat.com/errata/RHSA-2020:5119"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1897972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897972"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5119.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.20 packages and golang security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:32+00:00",
"generator": {
"date": "2025-11-06T23:52:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:5119",
"initial_release_date": "2020-11-24T11:57:51+00:00",
"revision_history": [
{
"date": "2020-11-24T11:57:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-11-24T11:57:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.ppc64le",
"product": {
"name": "faq-0:0.0.6-5.el7.ppc64le",
"product_id": "faq-0:0.0.6-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-4.rhaos4.5.git6dee389.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.s390x",
"product": {
"name": "faq-0:0.0.6-5.el7.s390x",
"product_id": "faq-0:0.0.6-5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_id": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-4.rhaos4.5.git6dee389.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.x86_64",
"product": {
"name": "faq-0:0.0.6-5.el7.x86_64",
"product_id": "faq-0:0.0.6-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-4.rhaos4.5.git6dee389.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.src",
"product": {
"name": "faq-0:0.0.6-5.el7.src",
"product_id": "faq-0:0.0.6-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"product": {
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"product_id": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"product": {
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"product_id": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202011121956.p0.git.0.7093c82.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"product": {
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"product_id": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product_id": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202011121956.p0.git.0.7093c82.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product_id": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.5.0-202011121956.p0.git.0.7093c82.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le"
},
"product_reference": "faq-0:0.0.6-5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x"
},
"product_reference": "faq-0:0.0.6-5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src"
},
"product_reference": "faq-0:0.0.6-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64"
},
"product_reference": "faq-0:0.0.6-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src"
},
"product_reference": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src"
},
"product_reference": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src"
},
"product_reference": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-24T11:57:51+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-24T11:57:51+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2021:1016
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.37 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.5.37. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1015\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster\n-between-minor.html#understanding-upgrade-channels_updating-cluster-between\n-minor\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1016",
"url": "https://access.redhat.com/errata/RHSA-2021:1016"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1944040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944040"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1016.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.37 security update",
"tracking": {
"current_release_date": "2025-11-06T23:53:02+00:00",
"generator": {
"date": "2025-11-06T23:53:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:1016",
"initial_release_date": "2021-04-13T23:35:52+00:00",
"revision_history": [
{
"date": "2021-04-13T23:35:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-13T23:35:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:53:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"product": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"product": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"product": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "podman-0:1.9.3-2.rhaos4.5.el8.src",
"product": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.src",
"product_id": "podman-0:1.9.3-2.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"product": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"product": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-5.git7c289cc.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"product": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"product": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-5.git7c289cc.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"product": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"product": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-5.git7c289cc.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"product": {
"name": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"product_id": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@1.9.3-2.rhaos4.5.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le"
},
"product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x"
},
"product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src"
},
"product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64"
},
"product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le"
},
"product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x"
},
"product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src"
},
"product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64"
},
"product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src"
},
"product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src"
},
"product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch"
},
"product_reference": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-13T23:35:52+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1016"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-13T23:35:52+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1016"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2021:0072
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "OpenShift Serverless 1.9.0 release and security update is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Serverless 1.9.0 is a generally available release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform version 4.5.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0072",
"url": "https://access.redhat.com/errata/RHSA-2021:0072"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0072.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Serverless 1.9.0 release and security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:42+00:00",
"generator": {
"date": "2025-11-06T23:52:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:0072",
"initial_release_date": "2021-01-11T21:59:01+00:00",
"revision_history": [
{
"date": "2021-01-11T21:59:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-11T21:59:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Serverless 1.9.0",
"product": {
"name": "OpenShift Serverless 1.9.0",
"product_id": "OpenShift Serverless 1.9.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:serverless:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Serverless"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Serverless 1.9.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-11T21:59:01+00:00",
"details": "See the documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index",
"product_ids": [
"OpenShift Serverless 1.9.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0072"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Serverless 1.9.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Serverless 1.9.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-11T21:59:01+00:00",
"details": "See the documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index",
"product_ids": [
"OpenShift Serverless 1.9.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0072"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Serverless 1.9.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021_0072
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "OpenShift Serverless 1.9.0 release and security update is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Serverless 1.9.0 is a generally available release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform version 4.5.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0072",
"url": "https://access.redhat.com/errata/RHSA-2021:0072"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0072.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Serverless 1.9.0 release and security update",
"tracking": {
"current_release_date": "2024-11-13T22:18:01+00:00",
"generator": {
"date": "2024-11-13T22:18:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2021:0072",
"initial_release_date": "2021-01-11T21:59:01+00:00",
"revision_history": [
{
"date": "2021-01-11T21:59:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-11T21:59:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:18:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Serverless 1.9.0",
"product": {
"name": "OpenShift Serverless 1.9.0",
"product_id": "OpenShift Serverless 1.9.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:serverless:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Serverless"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Serverless 1.9.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-11T21:59:01+00:00",
"details": "See the documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index",
"product_ids": [
"OpenShift Serverless 1.9.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0072"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Serverless 1.9.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Serverless 1.9.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-11T21:59:01+00:00",
"details": "See the documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index",
"product_ids": [
"OpenShift Serverless 1.9.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0072"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Serverless 1.9.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2020:4201
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 2.4.2 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Container-native Virtualization 2.4.2 Images (BZ#1877407)\n\nThis advisory contains the following OpenShift Virtualization 2.4.2 images:\n\nRHEL-7-CNV-2.4\n==============\nkubevirt-ssp-operator-container-v2.4.2-2\n\nRHEL-8-CNV-2.4\n==============\nvirt-cdi-controller-container-v2.4.2-1\nvirt-cdi-apiserver-container-v2.4.2-1\nhostpath-provisioner-operator-container-v2.4.2-1\nvirt-cdi-uploadproxy-container-v2.4.2-1\nvirt-cdi-cloner-container-v2.4.2-1\nvirt-cdi-importer-container-v2.4.2-1\nkubevirt-template-validator-container-v2.4.2-1\nhostpath-provisioner-container-v2.4.2-1\nvirt-cdi-uploadserver-container-v2.4.2-1\nvirt-cdi-operator-container-v2.4.2-1\nvirt-controller-container-v2.4.2-1\nkubevirt-cpu-model-nfd-plugin-container-v2.4.2-1\nvirt-api-container-v2.4.2-1\novs-cni-marker-container-v2.4.2-1\nkubevirt-cpu-node-labeller-container-v2.4.2-1\nbridge-marker-container-v2.4.2-1\nkubevirt-metrics-collector-container-v2.4.2-1\nkubemacpool-container-v2.4.2-1\ncluster-network-addons-operator-container-v2.4.2-1\novs-cni-plugin-container-v2.4.2-1\nkubernetes-nmstate-handler-container-v2.4.2-1\ncnv-containernetworking-plugins-container-v2.4.2-1\nvirtio-win-container-v2.4.2-1\nvirt-handler-container-v2.4.2-1\nvirt-launcher-container-v2.4.2-1\ncnv-must-gather-container-v2.4.2-1\nvirt-operator-container-v2.4.2-1\nvm-import-controller-container-v2.4.2-1\nhyperconverged-cluster-operator-container-v2.4.2-1\nvm-import-operator-container-v2.4.2-1\nkubevirt-vmware-container-v2.4.2-1\nkubevirt-v2v-conversion-container-v2.4.2-1\nkubevirt-kvm-info-nfd-plugin-container-v2.4.2-1\nnode-maintenance-operator-container-v2.4.2-1\nhco-bundle-registry-container-v2.4.2-15",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:4201",
"url": "https://access.redhat.com/errata/RHSA-2020:4201"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1869194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869194"
},
{
"category": "external",
"summary": "1869734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869734"
},
{
"category": "external",
"summary": "1875383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875383"
},
{
"category": "external",
"summary": "1877407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877407"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4201.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 2.4.2 Images",
"tracking": {
"current_release_date": "2025-11-06T23:52:18+00:00",
"generator": {
"date": "2025-11-06T23:52:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:4201",
"initial_release_date": "2020-10-06T23:52:47+00:00",
"revision_history": [
{
"date": "2020-10-06T23:52:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-06T23:52:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 2.4 for RHEL 8",
"product": {
"name": "CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:2.4::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-model-nfd-plugin\u0026tag=v2.4.2-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-node-labeller\u0026tag=v2.4.2-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"product_id": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-kvm-info-nfd-plugin\u0026tag=v2.4.2-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64",
"product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v2.4.2-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64 as a component of CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"relates_to_product_reference": "8Base-CNV-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64 as a component of CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"relates_to_product_reference": "8Base-CNV-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64 as a component of CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"relates_to_product_reference": "8Base-CNV-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64 as a component of CNV 2.4 for RHEL 8",
"product_id": "8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64",
"relates_to_product_reference": "8Base-CNV-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-06T23:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4201"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-06T23:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4201"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64",
"8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64",
"8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021:1515
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Openshift Logging Bug Fix Release (5.0.3)\nThis release includes a security update.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Openshift Logging Bug Fix Release (5.0.3)\n\nSecurity Fix(es):\n\n* jackson-databind: arbitrary code execution in slf4j-ext class\n(CVE-2018-14718)\n\n* jackson-databind: arbitrary code execution in blaze-ds-opt and\nblaze-ds-core classes (CVE-2018-14719)\n\n* jackson-databind: improper polymorphic deserialization in\naxis2-transport-jms class (CVE-2018-19360)\n\n* jackson-databind: improper polymorphic deserialization in openjpa class\n(CVE-2018-19361)\n\n* jackson-databind: improper polymorphic deserialization in\njboss-common-core class (CVE-2018-19362)\n\n* jackson-databind: default typing mishandling leading to remote code\nexecution (CVE-2019-14379)\n\n* jackson-databind: Serialization gadgets in\ncom.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.datasources.PerUserPoolDataSource (CVE-2020-35490)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.datasources.SharedPoolDataSource (CVE-2020-35491)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool\n(CVE-2020-35728)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\noadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS (CVE-2020-36179)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS (CVE-2020-36180)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS (CVE-2020-36181)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS (CVE-2020-36182)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-36183)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource\n(CVE-2020-36184)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource\n(CVE-2020-36185)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource\n(CVE-2020-36186)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource\n(CVE-2020-36187)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource\n(CVE-2020-36188)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSourc\ne (CVE-2020-36189)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to javax.swing (CVE-2021-20190)\n\n* jackson-databind: exfiltration/XXE in some JDK classes (CVE-2018-14720)\n\n* jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class\n(CVE-2018-14721)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1515",
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "LOG-1224",
"url": "https://issues.redhat.com/browse/LOG-1224"
},
{
"category": "external",
"summary": "LOG-1232",
"url": "https://issues.redhat.com/browse/LOG-1232"
},
{
"category": "external",
"summary": "LOG-1234",
"url": "https://issues.redhat.com/browse/LOG-1234"
},
{
"category": "external",
"summary": "LOG-1299",
"url": "https://issues.redhat.com/browse/LOG-1299"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1515.json"
}
],
"title": "Red Hat Security Advisory: Openshift Logging Bug Fix Release (5.0.3)",
"tracking": {
"current_release_date": "2025-11-06T23:53:04+00:00",
"generator": {
"date": "2025-11-06T23:53:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:1515",
"initial_release_date": "2021-05-06T13:38:14+00:00",
"revision_history": [
{
"date": "2021-05-06T13:38:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-05-06T13:38:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:53:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Logging 5.0",
"product": {
"name": "OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"product_id": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"product_id": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.0.3-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"product": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.0.3-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"product_id": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"product_id": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64"
},
"product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-14718",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666415"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using slf4j classes. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: arbitrary code execution in slf4j-ext class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in jackson-databind involves exploiting CVE-2018-1088 against slf4j, which was fixed in Red Hat products through the errata referenced at https://access.redhat.com/security/cve/cve-2018-8088. Applications that link only slf4j versions including that fix are not vulnerable to this vulnerability.\n\nRed Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle slf4j-ext jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14718"
},
{
"category": "external",
"summary": "RHBZ#1666415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14718",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718"
}
],
"release_date": "2018-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: arbitrary code execution in slf4j-ext class"
},
{
"cve": "CVE-2018-14719",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666418"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using blaze classes. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products are not affected by this issue as they do not bundle or provide the requisite gadget jars to exploit this vulnerability:\nRed Hat Satellite 6\nRed Hat Enterprise Virtualization 4\nRed Hat Fuse 6, 7, and Fuse Integration Services 2\nRed Hat A-MQ 6",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14719"
},
{
"category": "external",
"summary": "RHBZ#1666418",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14719",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719"
}
],
"release_date": "2018-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes"
},
{
"cve": "CVE-2018-14720",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666423"
}
],
"notes": [
{
"category": "description",
"text": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: exfiltration/XXE in some JDK classes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.\n\nRed Hat Enterprise Virtualization 4 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14720"
},
{
"category": "external",
"summary": "RHBZ#1666423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14720",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720"
}
],
"release_date": "2018-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible \n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: exfiltration/XXE in some JDK classes"
},
{
"cve": "CVE-2018-14721",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666428"
}
],
"notes": [
{
"category": "description",
"text": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle axis2-jaxws jar.\n\nRed Hat Virtualization is not affected by this issue, since its does not bundle axis2-jaxws jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14721"
},
{
"category": "external",
"summary": "RHBZ#1666428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721"
}
],
"release_date": "2018-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class"
},
{
"cve": "CVE-2018-19360",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the axis2-transport-jms class. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t include axis2-transport-jms jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include axis2-transport-jms jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-19360"
},
{
"category": "external",
"summary": "RHBZ#1666482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-19360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19360"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360"
}
],
"release_date": "2018-11-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class"
},
{
"cve": "CVE-2018-19361",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666484"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the OpenJPA class. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: improper polymorphic deserialization in openjpa class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-19361"
},
{
"category": "external",
"summary": "RHBZ#1666484",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-19361",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19361"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361"
}
],
"release_date": "2018-11-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: improper polymorphic deserialization in openjpa class"
},
{
"cve": "CVE-2018-19362",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the jboss-common-core class. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: improper polymorphic deserialization in jboss-common-core class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-19362"
},
{
"category": "external",
"summary": "RHBZ#1666489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-19362",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362"
}
],
"release_date": "2018-11-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: improper polymorphic deserialization in jboss-common-core class"
},
{
"cve": "CVE-2019-14379",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-07-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1737517"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: default typing mishandling leading to remote code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14379"
},
{
"category": "external",
"summary": "RHBZ#1737517",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14379"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379"
}
],
"release_date": "2019-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: default typing mishandling leading to remote code execution"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-24750",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2020-09-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1882310"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.6. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* OpenShift Container Platform\nThese products may update the jackson-databind dependency in a future release.\n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24750"
},
{
"category": "external",
"summary": "RHBZ#1882310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750"
}
],
"release_date": "2020-09-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid com.pastdev.httpcomponents in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration"
},
{
"cve": "CVE-2020-35490",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2020-12-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1909266"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update.\n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35490"
},
{
"category": "external",
"summary": "RHBZ#1909266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909266"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35490",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35490"
},
{
"category": "external",
"summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
"url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2986",
"url": "https://github.com/FasterXML/jackson-databind/issues/2986"
}
],
"release_date": "2020-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid org.apache.commons.dbcp2.datasources.PerUserPoolDataSource and org.apache.commons.dbcp2.datasources.SharedPoolDataSource in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource"
},
{
"cve": "CVE-2020-35491",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2020-12-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1909269"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35491"
},
{
"category": "external",
"summary": "RHBZ#1909269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909269"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35491",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35491"
},
{
"category": "external",
"summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
"url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2986",
"url": "https://github.com/FasterXML/jackson-databind/issues/2986"
}
],
"release_date": "2020-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid org.apache.commons.dbcp2.datasources.PerUserPoolDataSource and org.apache.commons.dbcp2.datasources.SharedPoolDataSource in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource"
},
{
"cve": "CVE-2020-35728",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2020-12-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1911502"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat Products ship jackson-databind version 2.10.0 or later which is not considered affected by this CVE (see https://medium.com/@cowtowncoder/jackson-2-10-safe-default-typing-2d018f0ce2ba) \n* JBoss Data Grid 7\n* JBoss Data Grid 8\n* Enterprise Application Platform 7\n* Red Hat Decision Manager 7\n* Red Hat Process Automation Manager 7\n* Red Hat Single Sign-On (RH-SSO) 7\n* Red Hat JBoss Fuse 7\n* Red Hat JBoss A-MQ\n* Red Hat Enterprise Linux 8\n* Red Hat Satellite 6.6\n* Red Hat Satellite 6.7\n* Red Hat Satellite 6.8\n* Red Hat CodeReady Studio 12\n\nRed Hat OpenShift Container Platform and Red Hat OpenStack Platform does ship the vulnerable components, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update.\n\nRed Hat OpenStack Platform 13 ships OpenDaylight, which contains the vulnerable jackson-databind, but does not expose jackson-databind in a way that would make it exploitable. As such, Red Hat will not be providing a fix for OpenDaylight at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35728"
},
{
"category": "external",
"summary": "RHBZ#1911502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35728"
},
{
"category": "external",
"summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
"url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2999",
"url": "https://github.com/FasterXML/jackson-databind/issues/2999"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool"
},
{
"cve": "CVE-2020-36179",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913871"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36179"
},
{
"category": "external",
"summary": "RHBZ#1913871",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913871"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36179",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36179"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3004",
"url": "https://github.com/FasterXML/jackson-databind/issues/3004"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS"
},
{
"cve": "CVE-2020-36180",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36180"
},
{
"category": "external",
"summary": "RHBZ#1913872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36180",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36180"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3004",
"url": "https://github.com/FasterXML/jackson-databind/issues/3004"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS"
},
{
"cve": "CVE-2020-36181",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913874"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but does not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36181"
},
{
"category": "external",
"summary": "RHBZ#1913874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913874"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36181",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36181"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3004",
"url": "https://github.com/FasterXML/jackson-databind/issues/3004"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS"
},
{
"cve": "CVE-2020-36182",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913926"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36182"
},
{
"category": "external",
"summary": "RHBZ#1913926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913926"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36182"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3004",
"url": "https://github.com/FasterXML/jackson-databind/issues/3004"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS"
},
{
"cve": "CVE-2020-36183",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913927"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36183"
},
{
"category": "external",
"summary": "RHBZ#1913927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36183"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3003",
"url": "https://github.com/FasterXML/jackson-databind/issues/3003"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool"
},
{
"cve": "CVE-2020-36184",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913928"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36184"
},
{
"category": "external",
"summary": "RHBZ#1913928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36184",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36184"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2998",
"url": "https://github.com/FasterXML/jackson-databind/issues/2998"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource"
},
{
"cve": "CVE-2020-36185",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913929"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36185"
},
{
"category": "external",
"summary": "RHBZ#1913929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913929"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36185"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2998",
"url": "https://github.com/FasterXML/jackson-databind/issues/2998"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource"
},
{
"cve": "CVE-2020-36186",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913931"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contain the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36186"
},
{
"category": "external",
"summary": "RHBZ#1913931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36186"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2997",
"url": "https://github.com/FasterXML/jackson-databind/issues/2997"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource"
},
{
"cve": "CVE-2020-36187",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913933"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contain the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36187"
},
{
"category": "external",
"summary": "RHBZ#1913933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913933"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36187",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36187"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2997",
"url": "https://github.com/FasterXML/jackson-databind/issues/2997"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource"
},
{
"cve": "CVE-2020-36188",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913934"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but they do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36188"
},
{
"category": "external",
"summary": "RHBZ#1913934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36188"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2996",
"url": "https://github.com/FasterXML/jackson-databind/issues/2996"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource"
},
{
"cve": "CVE-2020-36189",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913937"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36189"
},
{
"category": "external",
"summary": "RHBZ#1913937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913937"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36189"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2996",
"url": "https://github.com/FasterXML/jackson-databind/issues/2996"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource"
},
{
"cve": "CVE-2021-20190",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2020-01-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1916633"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* CodeReady WorkSpaces Server Container\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20190"
},
{
"category": "external",
"summary": "RHBZ#1916633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20190"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-5949-rw7g-wx7w",
"url": "https://github.com/advisories/GHSA-5949-rw7g-wx7w"
}
],
"release_date": "2021-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid javax.swing in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing"
}
]
}
rhsa-2020:4297
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jenkins-2-plugins, openshift-clients, podman, runc, and skopeo is now available for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nThe runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.\n\nThe skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. \n\nSecurity Fix(es):\n\n* jenkins-jira-plugin: plugin information disclosure (CVE-2019-16541)\n\n* jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM (CVE-2020-2252)\n\n* jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files (CVE-2020-2254)\n\n* jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests. (CVE-2020-2255)\n\n* kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4 (CVE-2020-8564)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:4297",
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1819663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819663"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1874268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268"
},
{
"category": "external",
"summary": "1880454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880454"
},
{
"category": "external",
"summary": "1880456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880456"
},
{
"category": "external",
"summary": "1880460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880460"
},
{
"category": "external",
"summary": "1886637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4297.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.1 package security update",
"tracking": {
"current_release_date": "2025-11-07T15:51:52+00:00",
"generator": {
"date": "2025-11-07T15:51:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:4297",
"initial_release_date": "2020-10-27T14:53:57+00:00",
"revision_history": [
{
"date": "2020-10-27T14:53:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-27T14:53:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T15:51:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-0:1.9.3-3.rhaos4.6.el8.src",
"product": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.src",
"product_id": "podman-0:1.9.3-3.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.6.1601368321-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"product": {
"name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"product_id": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@1.9.3-3.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.6.1601368321-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src"
},
"product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch"
},
"product_reference": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-16541",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2019-11-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1819663"
}
],
"notes": [
{
"category": "description",
"text": "Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-jira-plugin: plugin information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16541"
},
{
"category": "external",
"summary": "RHBZ#1819663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16541",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16541"
},
{
"category": "external",
"summary": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1106",
"url": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1106"
}
],
"release_date": "2019-11-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-jira-plugin: plugin information disclosure"
},
{
"cve": "CVE-2020-2252",
"cwe": {
"id": "CWE-297",
"name": "Improper Validation of Certificate with Host Mismatch"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1880454"
}
],
"notes": [
{
"category": "description",
"text": "Jenkins Mailer Plugin 1.32 and earlier does not perform hostname validation when connecting to the configured SMTP server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-2252"
},
{
"category": "external",
"summary": "RHBZ#1880454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880454"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-2252",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2252"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1813",
"url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1813"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/09/16/3",
"url": "https://www.openwall.com/lists/oss-security/2020/09/16/3"
}
],
"release_date": "2020-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM"
},
{
"cve": "CVE-2020-2254",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1880456"
}
],
"notes": [
{
"category": "description",
"text": "Jenkins Blue Ocean Plugin 1.23.2 and earlier provides an undocumented feature flag that, when enabled, allows an attacker with Job/Configure or Job/Create permission to read arbitrary files on the Jenkins controller file system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-2254"
},
{
"category": "external",
"summary": "RHBZ#1880456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-2254",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2254"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2020/09/16/3",
"url": "http://www.openwall.com/lists/oss-security/2020/09/16/3"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956",
"url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956"
}
],
"release_date": "2020-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files"
},
{
"cve": "CVE-2020-2255",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1880460"
}
],
"notes": [
{
"category": "description",
"text": "A missing permission check in Jenkins Blue Ocean Plugin 1.23.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-2255"
},
{
"category": "external",
"summary": "RHBZ#1880460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2255"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2255",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2255"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1961",
"url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1961"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/09/16/3",
"url": "https://www.openwall.com/lists/oss-security/2020/09/16/3"
}
],
"release_date": "2020-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests."
},
{
"acknowledgments": [
{
"names": [
"the Kubernetes Product Security Committee"
]
},
{
"names": [
"Nikolaos Moraitis"
],
"organization": "Red Hat",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-8564",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1886637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This can occur with client tools like `kubectl`, or other components that use registry credentials in a docker config file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8564"
},
{
"category": "external",
"summary": "RHBZ#1886637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8564",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564"
},
{
"category": "external",
"summary": "https://github.com/kubernetes/kubernetes/issues/95622",
"url": "https://github.com/kubernetes/kubernetes/issues/95622"
},
{
"category": "external",
"summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk",
"url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk"
}
],
"release_date": "2020-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4"
},
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-14370",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-07-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1874268"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in containers/podman. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container leak into subsequent containers. This flaw allows an attacker who controls the subsequent containers to gain access to sensitive information stored in such variables. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Whilst OpenShift Container Platform (OCP) does include podman, the Varlink API is not enabled by default. However, as it is trivial to activate this feature, OCP has been marked as affected.\n\nOCP 3.11 has previously packaged podman, but instead now relies on the version from rhel-extra.The older version previously packaged is not vulnerable to this CVE and hence has been marked not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14370"
},
{
"category": "external",
"summary": "RHBZ#1874268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14370",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370"
}
],
"release_date": "2020-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021:2122
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.7.13 is now available with updates to packages and images that fix several bugs.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.13. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2021:2121\n\nSecurity Fix(es):\n\n* jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks. (CVE-2021-21642)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints. (CVE-2021-21643)\n\n* jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. (CVE-2021-21644)\n\n* jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints. (CVE-2021-21645)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2122",
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1952146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952146"
},
{
"category": "external",
"summary": "1952148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952148"
},
{
"category": "external",
"summary": "1952151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952151"
},
{
"category": "external",
"summary": "1952152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952152"
},
{
"category": "external",
"summary": "1964770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964770"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2122.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.7.13 packages and security update",
"tracking": {
"current_release_date": "2025-11-06T23:53:13+00:00",
"generator": {
"date": "2025-11-06T23:53:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:2122",
"initial_release_date": "2021-06-01T04:12:55+00:00",
"revision_history": [
{
"date": "2021-06-01T04:12:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-06-01T04:12:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:53:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.7",
"product": {
"name": "Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.7::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.7",
"product": {
"name": "Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.7::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:47.83-2.el8.src",
"product": {
"name": "redhat-release-coreos-0:47.83-2.el8.src",
"product_id": "redhat-release-coreos-0:47.83-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.7.1621361158-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.20.0-3.el7.src",
"product": {
"name": "cri-tools-0:1.20.0-3.el7.src",
"product_id": "cri-tools-0:1.20.0-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.20.0-3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:47.83-2.el8.x86_64",
"product": {
"name": "redhat-release-coreos-0:47.83-2.el8.x86_64",
"product_id": "redhat-release-coreos-0:47.83-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.20.0-3.el7.x86_64",
"product": {
"name": "cri-tools-0:1.20.0-3.el7.x86_64",
"product_id": "cri-tools-0:1.20.0-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.20.0-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"product_id": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.20.0-3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:47.83-2.el8.ppc64le",
"product": {
"name": "redhat-release-coreos-0:47.83-2.el8.ppc64le",
"product_id": "redhat-release-coreos-0:47.83-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_id": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "redhat-release-coreos-0:47.83-2.el8.s390x",
"product": {
"name": "redhat-release-coreos-0:47.83-2.el8.s390x",
"product_id": "redhat-release-coreos-0:47.83-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.7.1621361158-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.20.0-3.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src"
},
"product_reference": "cri-tools-0:1.20.0-3.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.20.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64"
},
"product_reference": "cri-tools-0:1.20.0-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64"
},
"product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:47.83-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le"
},
"product_reference": "redhat-release-coreos-0:47.83-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:47.83-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x"
},
"product_reference": "redhat-release-coreos-0:47.83-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:47.83-2.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src"
},
"product_reference": "redhat-release-coreos-0:47.83-2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-coreos-0:47.83-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
},
"product_reference": "redhat-release-coreos-0:47.83-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2021-21642",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2021-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1952146"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the config-file-provider Jenkins plugin. The plugin XML parser wasn\u0027t configure to prevent XML external entity (XXE) attacks. An attacker with the ability to define Maven configuration files can use this vulnerability to prepare a crafted configuration file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21642"
},
{
"category": "external",
"summary": "RHBZ#1952146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21642"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21642",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21642"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2204",
"url": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2204"
}
],
"release_date": "2021-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks."
},
{
"cve": "CVE-2021-21643",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2021-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1952148"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the config-file-provider Jenkins plugin. The plugin does not correctly perform permission checks in several HTTP endpoints, as a consequence an attacker with global Job/Configure permission can enumerate system-scoped credentials IDs of credentials stored in Jenkins.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21643"
},
{
"category": "external",
"summary": "RHBZ#1952148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21643"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21643",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21643"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2254",
"url": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2254"
}
],
"release_date": "2021-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints."
},
{
"cve": "CVE-2021-21644",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"discovery_date": "2021-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1952151"
}
],
"notes": [
{
"category": "description",
"text": "A cross-site request forgery (CSRF) vulnerability was found in the config-file-provider Jenkins plugin. The plugin does not require POST requests for an HTTP endpoint which allows attackers to delete configuration files corresponding to an attacker-specified ID.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21644"
},
{
"category": "external",
"summary": "RHBZ#1952151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21644"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21644",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21644"
}
],
"release_date": "2021-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability."
},
{
"cve": "CVE-2021-21645",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2021-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1952152"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the config-file-provider Jenkins plugin. The plugin does not perform permission checks in several HTTP endpoints, as a consequence an attacker with Overall/Read permission is allowed to enumerate configuration file IDs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21645"
},
{
"category": "external",
"summary": "RHBZ#1952152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952152"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21645"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21645",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21645"
}
],
"release_date": "2021-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-01T04:12:55+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2122"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src",
"7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src",
"7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64",
"7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src",
"8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x",
"8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src",
"8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints."
}
]
}
RHSA-2021:1366
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.7.9 is now available with\nupdates to packages and images that fix several bugs.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.7.9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.7.9. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHSA-2021:1365\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n-between-minor.html#understanding-upgrade-channels_updating-cluster-between\n-minor\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1366",
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "1918750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750"
},
{
"category": "external",
"summary": "1953464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953464"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1366.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.7.9 packages and security update",
"tracking": {
"current_release_date": "2025-11-06T23:53:03+00:00",
"generator": {
"date": "2025-11-06T23:53:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:1366",
"initial_release_date": "2021-05-04T19:34:17+00:00",
"revision_history": [
{
"date": "2021-05-04T19:34:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-05-04T19:34:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:53:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.7",
"product": {
"name": "Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.7::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.7",
"product": {
"name": "Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.7::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"product": {
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"product_id": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.7.0-202104250659.p0.git.7d0a2b2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"product": {
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"product_id": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.7.0-202104250659.p0.git.e1b19c2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"product": {
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"product_id": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"product": {
"name": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"product_id": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.7.0-202104250659.p0.git.d49acc4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.7.0-202104250659.p0.git.95881af.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.7.0-202104250659.p0.git.95881af.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product_id": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.7.0-202104250659.p0.git.e1b19c2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product_id": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.7.0-202104250659.p0.git.e1b19c2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src"
},
"product_reference": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src"
},
"product_reference": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src"
},
"product_reference": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src"
},
"product_reference": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-04T19:34:17+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-04T19:34:17+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-04T19:34:17+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
},
{
"cve": "CVE-2021-3114",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-01-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1918750"
}
],
"notes": [
{
"category": "description",
"text": "A flaw detected in golang: crypto/elliptic, in which P-224 keys as generated can return incorrect inputs, reducing the strength of the cryptography. The highest threat from this vulnerability is confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/elliptic: incorrect operations on the P-224 curve",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3114"
},
{
"category": "external",
"summary": "RHBZ#1918750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/mperVMGa98w",
"url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w"
}
],
"release_date": "2021-01-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-04T19:34:17+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/elliptic: incorrect operations on the P-224 curve"
}
]
}
rhsa-2020_4297
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jenkins-2-plugins, openshift-clients, podman, runc, and skopeo is now available for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nThe runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.\n\nThe skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. \n\nSecurity Fix(es):\n\n* jenkins-jira-plugin: plugin information disclosure (CVE-2019-16541)\n\n* jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM (CVE-2020-2252)\n\n* jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files (CVE-2020-2254)\n\n* jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests. (CVE-2020-2255)\n\n* kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4 (CVE-2020-8564)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:4297",
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1819663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819663"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1874268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268"
},
{
"category": "external",
"summary": "1880454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880454"
},
{
"category": "external",
"summary": "1880456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880456"
},
{
"category": "external",
"summary": "1880460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880460"
},
{
"category": "external",
"summary": "1886637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4297.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.1 package security update",
"tracking": {
"current_release_date": "2025-01-06T18:49:02+00:00",
"generator": {
"date": "2025-01-06T18:49:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2020:4297",
"initial_release_date": "2020-10-27T14:53:57+00:00",
"revision_history": [
{
"date": "2020-10-27T14:53:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-27T14:53:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T18:49:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-0:1.9.3-3.rhaos4.6.el8.src",
"product": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.src",
"product_id": "podman-0:1.9.3-3.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.6.1601368321-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"product": {
"name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"product_id": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@1.9.3-3.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.6.1601368321-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src"
},
"product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch"
},
"product_reference": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-16541",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2019-11-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1819663"
}
],
"notes": [
{
"category": "description",
"text": "Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-jira-plugin: plugin information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16541"
},
{
"category": "external",
"summary": "RHBZ#1819663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16541",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16541"
},
{
"category": "external",
"summary": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1106",
"url": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1106"
}
],
"release_date": "2019-11-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-jira-plugin: plugin information disclosure"
},
{
"cve": "CVE-2020-2252",
"cwe": {
"id": "CWE-297",
"name": "Improper Validation of Certificate with Host Mismatch"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1880454"
}
],
"notes": [
{
"category": "description",
"text": "Jenkins Mailer Plugin 1.32 and earlier does not perform hostname validation when connecting to the configured SMTP server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-2252"
},
{
"category": "external",
"summary": "RHBZ#1880454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880454"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-2252",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2252"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1813",
"url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1813"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/09/16/3",
"url": "https://www.openwall.com/lists/oss-security/2020/09/16/3"
}
],
"release_date": "2020-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM"
},
{
"cve": "CVE-2020-2254",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1880456"
}
],
"notes": [
{
"category": "description",
"text": "Jenkins Blue Ocean Plugin 1.23.2 and earlier provides an undocumented feature flag that, when enabled, allows an attacker with Job/Configure or Job/Create permission to read arbitrary files on the Jenkins controller file system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-2254"
},
{
"category": "external",
"summary": "RHBZ#1880456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-2254",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2254"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2020/09/16/3",
"url": "http://www.openwall.com/lists/oss-security/2020/09/16/3"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956",
"url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956"
}
],
"release_date": "2020-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files"
},
{
"cve": "CVE-2020-2255",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1880460"
}
],
"notes": [
{
"category": "description",
"text": "A missing permission check in Jenkins Blue Ocean Plugin 1.23.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-2255"
},
{
"category": "external",
"summary": "RHBZ#1880460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2255"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2255",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2255"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1961",
"url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1961"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/09/16/3",
"url": "https://www.openwall.com/lists/oss-security/2020/09/16/3"
}
],
"release_date": "2020-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests."
},
{
"acknowledgments": [
{
"names": [
"the Kubernetes Product Security Committee"
]
},
{
"names": [
"Nikolaos Moraitis"
],
"organization": "Red Hat",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-8564",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1886637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This can occur with client tools like `kubectl`, or other components that use registry credentials in a docker config file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8564"
},
{
"category": "external",
"summary": "RHBZ#1886637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8564",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564"
},
{
"category": "external",
"summary": "https://github.com/kubernetes/kubernetes/issues/95622",
"url": "https://github.com/kubernetes/kubernetes/issues/95622"
},
{
"category": "external",
"summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk",
"url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk"
}
],
"release_date": "2020-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4"
},
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-14370",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-07-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1874268"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in containers/podman. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container leak into subsequent containers. This flaw allows an attacker who controls the subsequent containers to gain access to sensitive information stored in such variables. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Whilst OpenShift Container Platform (OCP) does include podman, the Varlink API is not enabled by default. However, as it is trivial to activate this feature, OCP has been marked as affected.\n\nOCP 3.11 has previously packaged podman, but instead now relies on the version from rhel-extra.The older version previously packaged is not vulnerable to this CVE and hence has been marked not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14370"
},
{
"category": "external",
"summary": "RHBZ#1874268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14370",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370"
}
],
"release_date": "2020-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhba-2021:0075
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Jaeger 1.17.8.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Jaeger provides these changes:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2021:0075",
"url": "https://access.redhat.com/errata/RHBA-2021:0075"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_0075.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Jaeger 1.17.8 Operator/Operand Containers",
"tracking": {
"current_release_date": "2025-11-06T23:51:28+00:00",
"generator": {
"date": "2025-11-06T23:51:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHBA-2021:0075",
"initial_release_date": "2021-01-12T09:34:21+00:00",
"revision_history": [
{
"date": "2021-01-12T09:34:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-12T09:34:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:51:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Jaeger 1.17",
"product": {
"name": "Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jaeger:1.17::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Jaeger"
},
{
"branches": [
{
"category": "product_version",
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"product": {
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.17.8-12"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"product": {
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.17.8-12"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"product": {
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.17.8-10"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"product": {
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.17.8-11"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"product": {
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.17.8-9"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"product": {
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.17.8-12"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"product": {
"name": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"product_id": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.17.8-10"
}
}
},
{
"category": "product_version",
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64",
"product": {
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64",
"product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.17.8-11"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64"
},
"product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64"
},
"product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64"
},
"product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64"
},
"product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64"
},
"product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64"
},
"product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64"
},
"product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64 as a component of Red Hat OpenShift Jaeger 1.17",
"product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
},
"product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64",
"relates_to_product_reference": "8Base-JAEGER-1.17"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-12T09:34:21+00:00",
"details": "Red Hat OpenShift Jaeger Release",
"product_ids": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-12T09:34:21+00:00",
"details": "Red Hat OpenShift Jaeger Release",
"product_ids": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0075"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64",
"8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhba-2020_5123
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.4.31 is now available with updates to packages and images that fix several bugs.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.4.31. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2020:5122\n\nAll OpenShift Container Platform 4.4 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:5123",
"url": "https://access.redhat.com/errata/RHBA-2020:5123"
},
{
"category": "external",
"summary": "1897975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897975"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_5123.json"
}
],
"title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.4.31 packages update",
"tracking": {
"current_release_date": "2024-11-13T22:07:29+00:00",
"generator": {
"date": "2024-11-13T22:07:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHBA-2020:5123",
"initial_release_date": "2020-12-02T16:36:58+00:00",
"revision_history": [
{
"date": "2020-12-02T16:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-02T16:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:07:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.4",
"product": {
"name": "Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.4",
"product": {
"name": "Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.4::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "iptables-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-arptables@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-devel@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-ebtables@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-libs@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-services@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-utils@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-debugsource@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-debuginfo@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-libs-debuginfo@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product": {
"name": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_id": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables-utils-debuginfo@1.8.4-10.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.4.0-202011122017.p0.git.3445.6937a03.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.x86_64",
"product": {
"name": "faq-0:0.0.6-5.el7.x86_64",
"product_id": "faq-0:0.0.6-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "iptables-0:1.8.4-10.el8_2.4.src",
"product": {
"name": "iptables-0:1.8.4-10.el8_2.4.src",
"product_id": "iptables-0:1.8.4-10.el8_2.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/iptables@1.8.4-10.el8_2.4?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"product": {
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"product_id": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.4.0-202011130111.p0.git.0.4861dfa.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.src",
"product": {
"name": "faq-0:0.0.6-5.el7.src",
"product_id": "faq-0:0.0.6-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"product": {
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"product_id": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"product": {
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"product_id": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.4.0-202011122017.p0.git.0.2755c9b.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.ppc64le",
"product": {
"name": "faq-0:0.0.6-5.el7.ppc64le",
"product_id": "faq-0:0.0.6-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.s390x",
"product": {
"name": "faq-0:0.0.6-5.el7.s390x",
"product_id": "faq-0:0.0.6-5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"product": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product_id": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.4.0-202011122017.p0.git.0.2755c9b.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product_id": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.4.0-202011122017.p0.git.0.2755c9b.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le"
},
"product_reference": "faq-0:0.0.6-5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x"
},
"product_reference": "faq-0:0.0.6-5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src"
},
"product_reference": "faq-0:0.0.6-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64"
},
"product_reference": "faq-0:0.0.6-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src"
},
"product_reference": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src"
},
"product_reference": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-0:1.8.4-10.el8_2.4.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src"
},
"product_reference": "iptables-0:1.8.4-10.el8_2.4.src",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-services-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
},
"product_reference": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src"
},
"product_reference": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.4",
"product_id": "8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-02T16:36:58+00:00",
"details": "For OpenShift Container Platform 4.4 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:5123"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src",
"7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src",
"8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64",
"8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-02T16:36:58+00:00",
"details": "For OpenShift Container Platform 4.4 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:5123"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src",
"7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x",
"7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64",
"8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src",
"8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64",
"8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2020:5605
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated images are now available for Red Hat OpenShift Container Storage 4.6.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nThese updated images include numerous security fixes, bug fixes, and enhancements. \n\nSecurity Fix(es):\n\n* nodejs-node-forge: prototype pollution via the util.setPath function (CVE-2020-7720)\n\n* nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS (CVE-2020-8237)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nUsers are directed to the Red Hat OpenShift Container Storage Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.6/html/4.6_release_notes/index\n\nAll Red Hat OpenShift Container Storage users are advised to upgrade to\nthese updated images.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5605",
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1806266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806266"
},
{
"category": "external",
"summary": "1813506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813506"
},
{
"category": "external",
"summary": "1817438",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817438"
},
{
"category": "external",
"summary": "1817850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817850"
},
{
"category": "external",
"summary": "1827157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827157"
},
{
"category": "external",
"summary": "1829055",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1829055"
},
{
"category": "external",
"summary": "1833153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833153"
},
{
"category": "external",
"summary": "1836299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836299"
},
{
"category": "external",
"summary": "1842254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842254"
},
{
"category": "external",
"summary": "1845976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845976"
},
{
"category": "external",
"summary": "1849771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849771"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1854500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854500"
},
{
"category": "external",
"summary": "1854501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854501"
},
{
"category": "external",
"summary": "1854503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854503"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1858195",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858195"
},
{
"category": "external",
"summary": "1859183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859183"
},
{
"category": "external",
"summary": "1859229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859229"
},
{
"category": "external",
"summary": "1859478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859478"
},
{
"category": "external",
"summary": "1860022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860022"
},
{
"category": "external",
"summary": "1860034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860034"
},
{
"category": "external",
"summary": "1860670",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860670"
},
{
"category": "external",
"summary": "1860848",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860848"
},
{
"category": "external",
"summary": "1861780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861780"
},
{
"category": "external",
"summary": "1865938",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865938"
},
{
"category": "external",
"summary": "1867024",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867024"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1868060",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868060"
},
{
"category": "external",
"summary": "1868703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868703"
},
{
"category": "external",
"summary": "1869411",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869411"
},
{
"category": "external",
"summary": "1870061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870061"
},
{
"category": "external",
"summary": "1870338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870338"
},
{
"category": "external",
"summary": "1870631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870631"
},
{
"category": "external",
"summary": "1872119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872119"
},
{
"category": "external",
"summary": "1872696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872696"
},
{
"category": "external",
"summary": "1873864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873864"
},
{
"category": "external",
"summary": "1874606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874606"
},
{
"category": "external",
"summary": "1875476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875476"
},
{
"category": "external",
"summary": "1877339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877339"
},
{
"category": "external",
"summary": "1877371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877371"
},
{
"category": "external",
"summary": "1878153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878153"
},
{
"category": "external",
"summary": "1878714",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878714"
},
{
"category": "external",
"summary": "1878853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878853"
},
{
"category": "external",
"summary": "1879008",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879008"
},
{
"category": "external",
"summary": "1879072",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879072"
},
{
"category": "external",
"summary": "1879919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879919"
},
{
"category": "external",
"summary": "1880255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880255"
},
{
"category": "external",
"summary": "1881028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881028"
},
{
"category": "external",
"summary": "1881071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881071"
},
{
"category": "external",
"summary": "1882397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882397"
},
{
"category": "external",
"summary": "1883253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883253"
},
{
"category": "external",
"summary": "1883398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883398"
},
{
"category": "external",
"summary": "1883767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883767"
},
{
"category": "external",
"summary": "1883810",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883810"
},
{
"category": "external",
"summary": "1883927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883927"
},
{
"category": "external",
"summary": "1885175",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885175"
},
{
"category": "external",
"summary": "1885428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885428"
},
{
"category": "external",
"summary": "1885648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885648"
},
{
"category": "external",
"summary": "1885971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885971"
},
{
"category": "external",
"summary": "1886308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886308"
},
{
"category": "external",
"summary": "1886348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886348"
},
{
"category": "external",
"summary": "1886551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886551"
},
{
"category": "external",
"summary": "1886709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886709"
},
{
"category": "external",
"summary": "1886859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886859"
},
{
"category": "external",
"summary": "1886873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886873"
},
{
"category": "external",
"summary": "1888583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888583"
},
{
"category": "external",
"summary": "1888593",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888593"
},
{
"category": "external",
"summary": "1888614",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888614"
},
{
"category": "external",
"summary": "1889441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889441"
},
{
"category": "external",
"summary": "1889683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889683"
},
{
"category": "external",
"summary": "1889866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889866"
},
{
"category": "external",
"summary": "1890183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890183"
},
{
"category": "external",
"summary": "1890638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890638"
},
{
"category": "external",
"summary": "1890971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890971"
},
{
"category": "external",
"summary": "1891856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891856"
},
{
"category": "external",
"summary": "1892206",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892206"
},
{
"category": "external",
"summary": "1892234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892234"
},
{
"category": "external",
"summary": "1893624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893624"
},
{
"category": "external",
"summary": "1893691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893691"
},
{
"category": "external",
"summary": "1893714",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893714"
},
{
"category": "external",
"summary": "1895402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895402"
},
{
"category": "external",
"summary": "1896298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896298"
},
{
"category": "external",
"summary": "1896831",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896831"
},
{
"category": "external",
"summary": "1898521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898521"
},
{
"category": "external",
"summary": "1902627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902627"
},
{
"category": "external",
"summary": "1904171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904171"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5605.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6.0 security, bug fix, enhancement update",
"tracking": {
"current_release_date": "2025-11-07T15:51:57+00:00",
"generator": {
"date": "2025-11-07T15:51:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:5605",
"initial_release_date": "2020-12-17T19:42:16+00:00",
"revision_history": [
{
"date": "2020-12-17T19:42:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-17T19:42:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T15:51:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product": {
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_container_storage:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Container Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"product_id": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"product_id": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"product_id": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"product_id": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"product_id": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"product_id": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"product_id": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"product_id": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"product_id": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"product_id": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"product_id": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"product_id": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"product_id": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"product_id": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"product_id": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7720",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-09-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1874606"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-node-forge. A Prototype Pollution via the util.setPath function is possible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-node-forge: prototype pollution via the util.setPath function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat Openshift Container Storage 4 the noobaa-core container includes the affected version of node-forge as a dependency of google-p12-pem, however the vulnerable function `util.setPath` is not being used and hence this issue has been rated as having a security impact of Low.\n\nIn OpenShift Container Platform (OCP) the prometheus container is behind OpenShift OAuth restricting access to the vulnerable node-forge library to authenticated users only, therefore the impact is Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-7720"
},
{
"category": "external",
"summary": "RHBZ#1874606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-7720",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7720"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677",
"url": "https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677"
}
],
"release_date": "2020-09-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-node-forge: prototype pollution via the util.setPath function"
},
{
"cve": "CVE-2020-8237",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-09-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1881028"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-json-bigint. A Prototype pollution in json-bigint npm may lead to a denial-of-service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat Openshift Container Storage 4 the noobaa-core container includes the affected version of json-bigint as a dependency of googleapis, however the json-bigint library is not being used and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8237"
},
{
"category": "external",
"summary": "RHBZ#1881028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8237",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8237"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8237",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8237"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/916430",
"url": "https://hackerone.com/reports/916430"
}
],
"release_date": "2020-08-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS"
},
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T19:42:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5605"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021:0956
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.6.23 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "ed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.6.23. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:0952\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster\n-between-minor.html#understanding-upgrade-channels_updating-cluster-between\n-minor.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0956",
"url": "https://access.redhat.com/errata/RHSA-2021:0956"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1941433",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941433"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0956.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.23 security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:59+00:00",
"generator": {
"date": "2025-11-06T23:52:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:0956",
"initial_release_date": "2021-03-30T16:48:30+00:00",
"revision_history": [
{
"date": "2021-03-30T16:48:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-03-30T16:48:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"product": {
"name": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"product_id": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"product": {
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"product_id": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"product": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"product": {
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"product_id": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.6.0-202103210832.p0.git.94284.834ccc7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"product": {
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"product_id": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202103192141.p0.git.0.d1b612b.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-6.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-6.git7c289cc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202103200039.p0.git.3841.3e951a5.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-6.git7c289cc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-6.git7c289cc.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"product": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-6.git7c289cc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-6.git7c289cc.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product_id": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202103192141.p0.git.0.d1b612b.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product_id": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.6.0-202103192141.p0.git.0.d1b612b.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src"
},
"product_reference": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src"
},
"product_reference": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src"
},
"product_reference": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src"
},
"product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
},
"product_reference": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src"
},
"product_reference": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-30T16:48:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-30T16:48:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-30T16:48:30+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src",
"8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x",
"8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64",
"8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src",
"8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch",
"8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
}
]
}
rhsa-2021_0713
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.34 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release also includes a security update for Red Hat OpenShift Container Platform 4.5.\n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.5.34. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2021:0714\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0713",
"url": "https://access.redhat.com/errata/RHSA-2021:0713"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1934454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934454"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0713.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.34 packages and security update",
"tracking": {
"current_release_date": "2024-11-13T22:19:50+00:00",
"generator": {
"date": "2024-11-13T22:19:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2021:0713",
"initial_release_date": "2021-03-11T04:48:46+00:00",
"revision_history": [
{
"date": "2021-03-11T04:48:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-03-11T04:48:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:19:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"product": {
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"product_id": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el8.src",
"product": {
"name": "cri-tools-0:1.18.0-4.el8.src",
"product_id": "cri-tools-0:1.18.0-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.src",
"product": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.src",
"product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "apb-0:2.0.3-3.el7.src",
"product": {
"name": "apb-0:2.0.3-3.el7.src",
"product_id": "apb-0:2.0.3-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el7.src",
"product": {
"name": "cri-tools-0:1.18.0-4.el7.src",
"product_id": "cri-tools-0:1.18.0-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"product": {
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"product_id": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el8.x86_64",
"product": {
"name": "cri-tools-0:1.18.0-4.el8.x86_64",
"product_id": "cri-tools-0:1.18.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"product_id": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_id": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-9.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "apb-0:2.0.3-3.el7.x86_64",
"product": {
"name": "apb-0:2.0.3-3.el7.x86_64",
"product_id": "apb-0:2.0.3-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el7.x86_64",
"product": {
"name": "cri-tools-0:1.18.0-4.el7.x86_64",
"product_id": "cri-tools-0:1.18.0-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el8.ppc64le",
"product": {
"name": "cri-tools-0:1.18.0-4.el8.ppc64le",
"product_id": "cri-tools-0:1.18.0-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"product_id": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_id": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-9.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "apb-0:2.0.3-3.el7.ppc64le",
"product": {
"name": "apb-0:2.0.3-3.el7.ppc64le",
"product_id": "apb-0:2.0.3-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el7.ppc64le",
"product": {
"name": "cri-tools-0:1.18.0-4.el7.ppc64le",
"product_id": "cri-tools-0:1.18.0-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_id": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el8.s390x",
"product": {
"name": "cri-tools-0:1.18.0-4.el8.s390x",
"product_id": "cri-tools-0:1.18.0-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"product": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"product_id": "cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_id": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-9.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "apb-0:2.0.3-3.el7.s390x",
"product": {
"name": "apb-0:2.0.3-3.el7.s390x",
"product_id": "apb-0:2.0.3-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.18.0-4.el7.s390x",
"product": {
"name": "cri-tools-0:1.18.0-4.el7.s390x",
"product_id": "cri-tools-0:1.18.0-4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"product": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"product_id": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"product": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apb-container-scripts-0:2.0.3-3.el7.noarch",
"product": {
"name": "apb-container-scripts-0:2.0.3-3.el7.noarch",
"product_id": "apb-container-scripts-0:2.0.3-3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb-container-scripts@2.0.3-3.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apb-devel-0:2.0.3-3.el7.noarch",
"product": {
"name": "apb-devel-0:2.0.3-3.el7.noarch",
"product_id": "apb-devel-0:2.0.3-3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apb-devel@2.0.3-3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-0:2.0.3-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le"
},
"product_reference": "apb-0:2.0.3-3.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-0:2.0.3-3.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x"
},
"product_reference": "apb-0:2.0.3-3.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-0:2.0.3-3.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src"
},
"product_reference": "apb-0:2.0.3-3.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-0:2.0.3-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64"
},
"product_reference": "apb-0:2.0.3-3.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-container-scripts-0:2.0.3-3.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch"
},
"product_reference": "apb-container-scripts-0:2.0.3-3.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apb-devel-0:2.0.3-3.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch"
},
"product_reference": "apb-devel-0:2.0.3-3.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le"
},
"product_reference": "cri-tools-0:1.18.0-4.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x"
},
"product_reference": "cri-tools-0:1.18.0-4.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src"
},
"product_reference": "cri-tools-0:1.18.0-4.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64"
},
"product_reference": "cri-tools-0:1.18.0-4.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src"
},
"product_reference": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src"
},
"product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64"
},
"product_reference": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64"
},
"product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64"
},
"product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le"
},
"product_reference": "cri-tools-0:1.18.0-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x"
},
"product_reference": "cri-tools-0:1.18.0-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src"
},
"product_reference": "cri-tools-0:1.18.0-4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.18.0-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64"
},
"product_reference": "cri-tools-0:1.18.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64"
},
"product_reference": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src"
},
"product_reference": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-11T04:48:46+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-11T04:48:46+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src",
"7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64",
"7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x",
"7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src",
"7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src",
"7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x",
"7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src",
"8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x",
"8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhba-2020:4229
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.15 is now available with\nupdates to packages and images that fix several bugs.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.5.15. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2020:4228\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:4229",
"url": "https://access.redhat.com/errata/RHBA-2020:4229"
},
{
"category": "external",
"summary": "1887283",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887283"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_4229.json"
}
],
"title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.15 packages update",
"tracking": {
"current_release_date": "2025-11-06T23:51:27+00:00",
"generator": {
"date": "2025-11-06T23:51:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHBA-2020:4229",
"initial_release_date": "2020-10-19T13:42:49+00:00",
"revision_history": [
{
"date": "2020-10-19T13:42:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-19T13:42:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:51:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"product": {
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"product_id": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"product": {
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"product_id": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202010081312.p0.git.0.401534e.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"product": {
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"product_id": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"product": {
"name": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"product_id": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"product": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"product": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_id": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"product": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"product": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-selftests-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product_id": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202010081312.p0.git.0.401534e.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product_id": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.5.0-202010081312.p0.git.0.401534e.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.24.1.el8_2.dt1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_id": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.24.1.el8_2.dt1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src"
},
"product_reference": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src"
},
"product_reference": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le"
},
"product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x"
},
"product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src"
},
"product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64"
},
"product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src"
},
"product_reference": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src"
},
"product_reference": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-19T13:42:49+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4229"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-19T13:42:49+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4229"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2021:4103
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.9.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform. \n\nThis advisory contains OpenShift Virtualization 4.9.0 RPMs.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4103",
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1918750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750"
},
{
"category": "external",
"summary": "1958341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341"
},
{
"category": "external",
"summary": "1981345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981345"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4103.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.9.0 RPMs security and bug fix update",
"tracking": {
"current_release_date": "2025-11-07T16:39:26+00:00",
"generator": {
"date": "2025-11-07T16:39:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:4103",
"initial_release_date": "2021-11-02T17:36:11+00:00",
"revision_history": [
{
"date": "2021-11-02T17:36:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-02T17:36:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T16:39:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.9 for RHEL 7",
"product": {
"name": "CNV 4.9 for RHEL 7",
"product_id": "7Server-CNV-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.9::el7"
}
}
},
{
"category": "product_name",
"name": "CNV 4.9 for RHEL 8",
"product": {
"name": "CNV 4.9 for RHEL 8",
"product_id": "8Base-CNV-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.9::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-0:4.9.0-287.el7.src",
"product": {
"name": "kubevirt-0:4.9.0-287.el7.src",
"product_id": "kubevirt-0:4.9.0-287.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.9.0-287.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kubevirt-0:4.9.0-287.el8.src",
"product": {
"name": "kubevirt-0:4.9.0-287.el8.src",
"product_id": "kubevirt-0:4.9.0-287.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.9.0-287.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"product_id": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.9.0-287.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.9.0-287.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"product_id": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.9.0-287.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.9.0-287.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.9.0-287.el7.src as a component of CNV 4.9 for RHEL 7",
"product_id": "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src"
},
"product_reference": "kubevirt-0:4.9.0-287.el7.src",
"relates_to_product_reference": "7Server-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64 as a component of CNV 4.9 for RHEL 7",
"product_id": "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64 as a component of CNV 4.9 for RHEL 7",
"product_id": "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.9.0-287.el8.src as a component of CNV 4.9 for RHEL 8",
"product_id": "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src"
},
"product_reference": "kubevirt-0:4.9.0-287.el8.src",
"relates_to_product_reference": "8Base-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64 as a component of CNV 4.9 for RHEL 8",
"product_id": "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64 as a component of CNV 4.9 for RHEL 8",
"product_id": "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-02T17:36:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-02T17:36:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2021-3114",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1918750"
}
],
"notes": [
{
"category": "description",
"text": "A flaw detected in golang: crypto/elliptic, in which P-224 keys as generated can return incorrect inputs, reducing the strength of the cryptography. The highest threat from this vulnerability is confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/elliptic: incorrect operations on the P-224 curve",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3114"
},
{
"category": "external",
"summary": "RHBZ#1918750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/mperVMGa98w",
"url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w"
}
],
"release_date": "2021-01-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-02T17:36:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/elliptic: incorrect operations on the P-224 curve"
},
{
"cve": "CVE-2021-31525",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1958341"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31525"
},
{
"category": "external",
"summary": "RHBZ#1958341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc",
"url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc"
}
],
"release_date": "2021-04-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-02T17:36:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4103"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src",
"7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64",
"7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64",
"8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src",
"8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64",
"8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header"
}
]
}
RHBA-2020:4229
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.15 is now available with\nupdates to packages and images that fix several bugs.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.5.15. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2020:4228\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2020:4229",
"url": "https://access.redhat.com/errata/RHBA-2020:4229"
},
{
"category": "external",
"summary": "1887283",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887283"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_4229.json"
}
],
"title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.15 packages update",
"tracking": {
"current_release_date": "2025-11-06T23:51:27+00:00",
"generator": {
"date": "2025-11-06T23:51:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHBA-2020:4229",
"initial_release_date": "2020-10-19T13:42:49+00:00",
"revision_history": [
{
"date": "2020-10-19T13:42:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-19T13:42:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:51:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"product": {
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"product_id": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"product": {
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"product_id": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202010081312.p0.git.0.401534e.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"product": {
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"product_id": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"product": {
"name": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"product_id": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"product": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"product": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_id": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"product": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"product": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-selftests-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product_id": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202010081312.p0.git.0.401534e.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product_id": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.5.0-202010081312.p0.git.0.401534e.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.24.1.el8_2.dt1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_id": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.24.1.el8_2.dt1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src"
},
"product_reference": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src"
},
"product_reference": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64"
},
"product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64"
},
"product_reference": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le"
},
"product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x"
},
"product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src"
},
"product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64"
},
"product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src"
},
"product_reference": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src"
},
"product_reference": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-19T13:42:49+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4229"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-19T13:42:49+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2020:4229"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src",
"8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src",
"8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64",
"8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src",
"8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x",
"8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2020:4297
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jenkins-2-plugins, openshift-clients, podman, runc, and skopeo is now available for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nThe runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.\n\nThe skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. \n\nSecurity Fix(es):\n\n* jenkins-jira-plugin: plugin information disclosure (CVE-2019-16541)\n\n* jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM (CVE-2020-2252)\n\n* jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files (CVE-2020-2254)\n\n* jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests. (CVE-2020-2255)\n\n* kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4 (CVE-2020-8564)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:4297",
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1819663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819663"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1874268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268"
},
{
"category": "external",
"summary": "1880454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880454"
},
{
"category": "external",
"summary": "1880456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880456"
},
{
"category": "external",
"summary": "1880460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880460"
},
{
"category": "external",
"summary": "1886637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4297.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.1 package security update",
"tracking": {
"current_release_date": "2025-11-07T15:51:52+00:00",
"generator": {
"date": "2025-11-07T15:51:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:4297",
"initial_release_date": "2020-10-27T14:53:57+00:00",
"revision_history": [
{
"date": "2020-10-27T14:53:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-27T14:53:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T15:51:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.6",
"product": {
"name": "Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.6::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-0:1.9.3-3.rhaos4.6.el8.src",
"product": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.src",
"product_id": "podman-0:1.9.3-3.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.6.1601368321-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"product": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"product": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"product": {
"name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"product_id": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@1.9.3-3.rhaos4.6.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.6.1601368321-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src"
},
"product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch"
},
"product_reference": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le"
},
"product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x"
},
"product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
},
"product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
},
"product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6",
"product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-16541",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2019-11-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1819663"
}
],
"notes": [
{
"category": "description",
"text": "Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-jira-plugin: plugin information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16541"
},
{
"category": "external",
"summary": "RHBZ#1819663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16541",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16541"
},
{
"category": "external",
"summary": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1106",
"url": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1106"
}
],
"release_date": "2019-11-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-jira-plugin: plugin information disclosure"
},
{
"cve": "CVE-2020-2252",
"cwe": {
"id": "CWE-297",
"name": "Improper Validation of Certificate with Host Mismatch"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1880454"
}
],
"notes": [
{
"category": "description",
"text": "Jenkins Mailer Plugin 1.32 and earlier does not perform hostname validation when connecting to the configured SMTP server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-2252"
},
{
"category": "external",
"summary": "RHBZ#1880454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880454"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-2252",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2252"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1813",
"url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1813"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/09/16/3",
"url": "https://www.openwall.com/lists/oss-security/2020/09/16/3"
}
],
"release_date": "2020-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM"
},
{
"cve": "CVE-2020-2254",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1880456"
}
],
"notes": [
{
"category": "description",
"text": "Jenkins Blue Ocean Plugin 1.23.2 and earlier provides an undocumented feature flag that, when enabled, allows an attacker with Job/Configure or Job/Create permission to read arbitrary files on the Jenkins controller file system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-2254"
},
{
"category": "external",
"summary": "RHBZ#1880456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-2254",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2254"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2020/09/16/3",
"url": "http://www.openwall.com/lists/oss-security/2020/09/16/3"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956",
"url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956"
}
],
"release_date": "2020-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files"
},
{
"cve": "CVE-2020-2255",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1880460"
}
],
"notes": [
{
"category": "description",
"text": "A missing permission check in Jenkins Blue Ocean Plugin 1.23.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-2255"
},
{
"category": "external",
"summary": "RHBZ#1880460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2255"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2255",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2255"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1961",
"url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1961"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/09/16/3",
"url": "https://www.openwall.com/lists/oss-security/2020/09/16/3"
}
],
"release_date": "2020-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests."
},
{
"acknowledgments": [
{
"names": [
"the Kubernetes Product Security Committee"
]
},
{
"names": [
"Nikolaos Moraitis"
],
"organization": "Red Hat",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-8564",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1886637"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This can occur with client tools like `kubectl`, or other components that use registry credentials in a docker config file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8564"
},
{
"category": "external",
"summary": "RHBZ#1886637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8564",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564"
},
{
"category": "external",
"summary": "https://github.com/kubernetes/kubernetes/issues/95622",
"url": "https://github.com/kubernetes/kubernetes/issues/95622"
},
{
"category": "external",
"summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk",
"url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk"
}
],
"release_date": "2020-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4"
},
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-14370",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-07-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1874268"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in containers/podman. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container leak into subsequent containers. This flaw allows an attacker who controls the subsequent containers to gain access to sensitive information stored in such variables. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Whilst OpenShift Container Platform (OCP) does include podman, the Varlink API is not enabled by default. However, as it is trivial to activate this feature, OCP has been marked as affected.\n\nOCP 3.11 has previously packaged podman, but instead now relies on the version from rhel-extra.The older version previously packaged is not vulnerable to this CVE and hence has been marked not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14370"
},
{
"category": "external",
"summary": "RHBZ#1874268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14370",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370"
}
],
"release_date": "2020-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-27T14:53:57+00:00",
"details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src",
"7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src",
"8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src",
"8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x",
"8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src",
"8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x",
"8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021_0799
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for RHEL-8-CNV-2.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 2.6.0 images:\n\nRHEL-8-CNV-2.6\n==============\nkubevirt-cpu-node-labeller-container-v2.6.0-5\nkubevirt-cpu-model-nfd-plugin-container-v2.6.0-5\nnode-maintenance-operator-container-v2.6.0-13\nkubevirt-vmware-container-v2.6.0-5\nvirtio-win-container-v2.6.0-5\nkubevirt-kvm-info-nfd-plugin-container-v2.6.0-5\nbridge-marker-container-v2.6.0-9\nkubevirt-template-validator-container-v2.6.0-9\nkubevirt-v2v-conversion-container-v2.6.0-6\nkubemacpool-container-v2.6.0-13\nkubevirt-ssp-operator-container-v2.6.0-40\nhyperconverged-cluster-webhook-container-v2.6.0-73\nhyperconverged-cluster-operator-container-v2.6.0-73\novs-cni-plugin-container-v2.6.0-10\ncnv-containernetworking-plugins-container-v2.6.0-10\novs-cni-marker-container-v2.6.0-10\ncluster-network-addons-operator-container-v2.6.0-16\nhostpath-provisioner-container-v2.6.0-11\nhostpath-provisioner-operator-container-v2.6.0-14\nvm-import-virtv2v-container-v2.6.0-21\nkubernetes-nmstate-handler-container-v2.6.0-19\nvm-import-controller-container-v2.6.0-21\nvm-import-operator-container-v2.6.0-21\nvirt-api-container-v2.6.0-111\nvirt-controller-container-v2.6.0-111\nvirt-handler-container-v2.6.0-111\nvirt-operator-container-v2.6.0-111\nvirt-launcher-container-v2.6.0-111\ncnv-must-gather-container-v2.6.0-54\nvirt-cdi-importer-container-v2.6.0-24\nvirt-cdi-cloner-container-v2.6.0-24\nvirt-cdi-controller-container-v2.6.0-24\nvirt-cdi-uploadserver-container-v2.6.0-24\nvirt-cdi-apiserver-container-v2.6.0-24\nvirt-cdi-uploadproxy-container-v2.6.0-24\nvirt-cdi-operator-container-v2.6.0-24\nhco-bundle-registry-container-v2.6.0-582\n\nSecurity Fix(es):\n\n* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)\n\n* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)\n\n* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\n* containernetworking-cni: Arbitrary path injection via type field in CNI configuration (CVE-2021-20206)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0799",
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1732329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732329"
},
{
"category": "external",
"summary": "1783192",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783192"
},
{
"category": "external",
"summary": "1791753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791753"
},
{
"category": "external",
"summary": "1804533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533"
},
{
"category": "external",
"summary": "1848954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848954"
},
{
"category": "external",
"summary": "1848956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848956"
},
{
"category": "external",
"summary": "1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "1853911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853911"
},
{
"category": "external",
"summary": "1854098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854098"
},
{
"category": "external",
"summary": "1856347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856347"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1859235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859235"
},
{
"category": "external",
"summary": "1860714",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860714"
},
{
"category": "external",
"summary": "1860992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860992"
},
{
"category": "external",
"summary": "1864577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1864577"
},
{
"category": "external",
"summary": "1866593",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1866593"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1868817",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868817"
},
{
"category": "external",
"summary": "1873771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873771"
},
{
"category": "external",
"summary": "1874812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874812"
},
{
"category": "external",
"summary": "1878499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878499"
},
{
"category": "external",
"summary": "1879108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879108"
},
{
"category": "external",
"summary": "1881874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881874"
},
{
"category": "external",
"summary": "1883232",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883232"
},
{
"category": "external",
"summary": "1883371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371"
},
{
"category": "external",
"summary": "1885153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885153"
},
{
"category": "external",
"summary": "1885418",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885418"
},
{
"category": "external",
"summary": "1887398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887398"
},
{
"category": "external",
"summary": "1889295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889295"
},
{
"category": "external",
"summary": "1891285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891285"
},
{
"category": "external",
"summary": "1891440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891440"
},
{
"category": "external",
"summary": "1892227",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892227"
},
{
"category": "external",
"summary": "1893278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893278"
},
{
"category": "external",
"summary": "1893646",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893646"
},
{
"category": "external",
"summary": "1894428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894428"
},
{
"category": "external",
"summary": "1894824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894824"
},
{
"category": "external",
"summary": "1894897",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894897"
},
{
"category": "external",
"summary": "1895414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895414"
},
{
"category": "external",
"summary": "1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "1898072",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898072"
},
{
"category": "external",
"summary": "1898840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898840"
},
{
"category": "external",
"summary": "1899558",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899558"
},
{
"category": "external",
"summary": "1901480",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901480"
},
{
"category": "external",
"summary": "1902046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902046"
},
{
"category": "external",
"summary": "1902111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111"
},
{
"category": "external",
"summary": "1903014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903014"
},
{
"category": "external",
"summary": "1903585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903585"
},
{
"category": "external",
"summary": "1904797",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904797"
},
{
"category": "external",
"summary": "1906199",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906199"
},
{
"category": "external",
"summary": "1907151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907151"
},
{
"category": "external",
"summary": "1907352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907352"
},
{
"category": "external",
"summary": "1907691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907691"
},
{
"category": "external",
"summary": "1907988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907988"
},
{
"category": "external",
"summary": "1908363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908363"
},
{
"category": "external",
"summary": "1908421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908421"
},
{
"category": "external",
"summary": "1908883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883"
},
{
"category": "external",
"summary": "1909458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909458"
},
{
"category": "external",
"summary": "1910857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910857"
},
{
"category": "external",
"summary": "1911118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911118"
},
{
"category": "external",
"summary": "1911396",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911396"
},
{
"category": "external",
"summary": "1911662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911662"
},
{
"category": "external",
"summary": "1912908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912908"
},
{
"category": "external",
"summary": "1913248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913248"
},
{
"category": "external",
"summary": "1913320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913320"
},
{
"category": "external",
"summary": "1913717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913717"
},
{
"category": "external",
"summary": "1913756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913756"
},
{
"category": "external",
"summary": "1914177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914177"
},
{
"category": "external",
"summary": "1914608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914608"
},
{
"category": "external",
"summary": "1914947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914947"
},
{
"category": "external",
"summary": "1917908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917908"
},
{
"category": "external",
"summary": "1917963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917963"
},
{
"category": "external",
"summary": "1919391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391"
},
{
"category": "external",
"summary": "1920576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920576"
},
{
"category": "external",
"summary": "1920610",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920610"
},
{
"category": "external",
"summary": "1921650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650"
},
{
"category": "external",
"summary": "1923979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923979"
},
{
"category": "external",
"summary": "1927373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927373"
},
{
"category": "external",
"summary": "1931376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931376"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0799.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 2.6.0 security and bug fix update",
"tracking": {
"current_release_date": "2025-01-06T18:49:44+00:00",
"generator": {
"date": "2025-01-06T18:49:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHSA-2021:0799",
"initial_release_date": "2021-03-10T11:41:12+00:00",
"revision_history": [
{
"date": "2021-03-10T11:41:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-03-10T11:41:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T18:49:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 2.6 for RHEL 8",
"product": {
"name": "CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-model-nfd-plugin\u0026tag=v2.6.0-9"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-node-labeller\u0026tag=v2.6.0-7"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"product_id": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-kvm-info-nfd-plugin\u0026tag=v2.6.0-7"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v2.6.0-25"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product_id": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller\u0026tag=v2.6.0-25"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-9283",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2020-02-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1804533"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the SSH package of the golang.org/x/crypto library. An attacker could exploit this flaw by supplying crafted SSH ed25519 keys to cause a crash in applications that use this package as either an SSH client or server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform uses the vulnerable library in a number of components but strictly as an SSH client. The severity of this vulnerability is reduced for clients as it requires connections to malicious SSH servers, with the maximum impact only a client crash. This vulnerability is rated Low for OpenShift Container Platform.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9283"
},
{
"category": "external",
"summary": "RHBZ#1804533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9283",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9283"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY",
"url": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY"
}
],
"release_date": "2020-02-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic"
},
{
"cve": "CVE-2020-14040",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-06-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853652"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14040"
},
{
"category": "external",
"summary": "RHBZ#1853652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/39491",
"url": "https://github.com/golang/go/issues/39491"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
"url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"
}
],
"release_date": "2020-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-26160",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2020-09-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1883371"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in jwt-go where it is vulnerable to Access Restriction Bypass if m[\"aud\"] happens to be []string{}, as allowed by the spec, the type assertion fails and the value of aud is \"\". This can cause audience verification to succeed even if the audiences being passed are incorrect if required is set to false.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jwt-go: access restriction bypass vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The github.com/dgrijalva/jwt-go module is an indirect dependency of the k8s.io/client-go module pulled into Quay Bridge, and Setup operators via the Operator\u0027s SDK generated code. The k8s.io/client-go module does not use jwt-go in an unsafe way [1]. Red Hat Quay components have been marked as wontfix. This may be fixed in the future.\n\nSimilar to Quay, multiple OpenShift Container Platform (OCP) containers include jwt-go as a transient dependency due to go-autorest [1]. As such, those containers do not use jwt-go in an unsafe way. They have been marked wontfix at this time and may be fixed in a future update.\n\nSame as Quay and OpenShift Container Platform, components shipped with Red Hat OpenShift Container Storage 4 do not use jwt-go in an unsafe way and hence this issue has been rated as having a security impact of Low. A future update may address this issue.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli as a technical preview and is not currently planned to be addressed in future updates, hence the multi-cloud-object-gateway-cli package will not be fixed.\n\n[1] https://github.com/Azure/go-autorest/issues/568#issuecomment-703804062",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26160"
},
{
"category": "external",
"summary": "RHBZ#1883371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26160",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26160"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515",
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jwt-go: access restriction bypass vulnerability"
},
{
"cve": "CVE-2020-27813",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-11-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902111"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker could use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang-github-gorilla-websocket: integer overflow leads to denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27813"
},
{
"category": "external",
"summary": "RHBZ#1902111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27813",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27813"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813"
},
{
"category": "external",
"summary": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh",
"url": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh"
}
],
"release_date": "2019-08-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang-github-gorilla-websocket: integer overflow leads to denial of service"
},
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
},
{
"cve": "CVE-2020-29652",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908883"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference vulnerability was found in golang. When using the library\u0027s ssh server without specifying an option for GSSAPIWithMICConfig, it is possible for an attacker to craft an ssh client connection using the `gssapi-with-mic` authentication method and cause the server to panic resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A large number of products include the affected package, but do not make use of the vulnerable SSH server code. Accordingly, the flaw itself is rated as \"Important\", but these products themselves all have a \"Low\" severity rating.\n\nAdditionally, a number of products include golang.org/x/crypto (or even golang.org/x/crypto/ssh/terminal) but not specifically golang.org/x/crypto/ssh/server.go in the final build. As this would result in a very large number of entries of not affected products, only products which include the ssh server code (golang.org/x/crypto/ssh/server.go) have been represented here. \n\nRed Hat Enterprise Linux 8 container-tools:rhel8/containernetworking-plugins is not affected because although it uses some functionality from golang.org/x/crypto, it does not use or import anything from golang.org/x/crypto/ssh/*.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29652"
},
{
"category": "external",
"summary": "RHBZ#1908883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29652",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29652"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1"
}
],
"release_date": "2020-12-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference"
},
{
"cve": "CVE-2021-3121",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921650"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3121"
},
{
"category": "external",
"summary": "RHBZ#1921650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121"
}
],
"release_date": "2021-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation"
},
{
"acknowledgments": [
{
"names": [
"Casey Callendrello"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-20206",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2021-01-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919391"
}
],
"notes": [
{
"category": "description",
"text": "An improper limitation of path name flaw was found in containernetworking/cni. When specifying the plugin to load in the `type` field in the network configuration, it is possible to use special elements such as \"../\" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as `reboot`. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "containernetworking-cni: Arbitrary path injection via type field in CNI configuration",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) does package a vulnerable version of containernetworking/cni, however, the NetworkDefinitionAttachment is defined in code and cannot be easily changed except through a user who has access to the operator namespace such as cluster-admin. As such, for OSSM, the impact is Moderate.\n\nThe fix for podman was released as a part of OpenShift 4.8 and is included in future releases.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20206"
},
{
"category": "external",
"summary": "RHBZ#1919391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20206",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20206"
}
],
"release_date": "2021-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-10T11:41:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0799"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "containernetworking-cni: Arbitrary path injection via type field in CNI configuration"
}
]
}
rhsa-2021_1016
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.37 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.5.37. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1015\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster\n-between-minor.html#understanding-upgrade-channels_updating-cluster-between\n-minor\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1016",
"url": "https://access.redhat.com/errata/RHSA-2021:1016"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1944040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944040"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1016.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.37 security update",
"tracking": {
"current_release_date": "2024-11-13T22:20:26+00:00",
"generator": {
"date": "2024-11-13T22:20:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2021:1016",
"initial_release_date": "2021-04-13T23:35:52+00:00",
"revision_history": [
{
"date": "2021-04-13T23:35:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-13T23:35:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:20:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"product": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"product": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"product": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "podman-0:1.9.3-2.rhaos4.5.el8.src",
"product": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.src",
"product_id": "podman-0:1.9.3-2.rhaos4.5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"product": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"product": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-5.git7c289cc.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_id": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_id": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-2.rhaos4.5.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"product": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"product": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-5.git7c289cc.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_id": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_id": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-2.rhaos4.5.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"product": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"product": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"product": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"product_id": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-5.git7c289cc.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_id": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_id": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-2.rhaos4.5.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"product": {
"name": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"product_id": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@1.9.3-2.rhaos4.5.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le"
},
"product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x"
},
"product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src"
},
"product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64"
},
"product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le"
},
"product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x"
},
"product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src"
},
"product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64"
},
"product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64"
},
"product_reference": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src"
},
"product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le"
},
"product_reference": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x"
},
"product_reference": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64"
},
"product_reference": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src"
},
"product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch"
},
"product_reference": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x"
},
"product_reference": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64"
},
"product_reference": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
},
"product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-13T23:35:52+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1016"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-13T23:35:52+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1016"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src",
"7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src",
"8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x",
"8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src",
"8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x",
"8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2020:5649
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for OpenShift Service Mesh 1.1.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5649",
"url": "https://access.redhat.com/errata/RHSA-2020:5649"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5649.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1.11 security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:40+00:00",
"generator": {
"date": "2025-11-06T23:52:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:5649",
"initial_release_date": "2020-12-22T04:53:46+00:00",
"revision_history": [
{
"date": "2020-12-22T04:53:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-22T04:53:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Service Mesh 1.1",
"product": {
"name": "OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:1.1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "ior-0:1.1.11-2.el8.src",
"product": {
"name": "ior-0:1.1.11-2.el8.src",
"product_id": "ior-0:1.1.11-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ior@1.1.11-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-20.el8.src",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-20.el8.src",
"product_id": "servicemesh-prometheus-0:2.14.0-20.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-20.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:1.1.11-2.el8.src",
"product": {
"name": "servicemesh-cni-0:1.1.11-2.el8.src",
"product_id": "servicemesh-cni-0:1.1.11-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@1.1.11-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:1.1.11-2.el8.src",
"product": {
"name": "servicemesh-0:1.1.11-2.el8.src",
"product_id": "servicemesh-0:1.1.11-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@1.1.11-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-19.el8.src",
"product": {
"name": "servicemesh-grafana-0:6.4.3-19.el8.src",
"product_id": "servicemesh-grafana-0:6.4.3-19.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-19.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:1.1.11-3.el8.src",
"product": {
"name": "servicemesh-operator-0:1.1.11-3.el8.src",
"product_id": "servicemesh-operator-0:1.1.11-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@1.1.11-3.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ior-0:1.1.11-2.el8.x86_64",
"product": {
"name": "ior-0:1.1.11-2.el8.x86_64",
"product_id": "ior-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ior@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"product_id": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-20.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-cni-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-cni-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-citadel@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-galley-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-galley-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-galley-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-galley@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64",
"product": {
"name": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64",
"product_id": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-sidecar-injector@1.1.11-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"product": {
"name": "servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"product_id": "servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-19.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"product": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"product_id": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-19.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:1.1.11-3.el8.x86_64",
"product": {
"name": "servicemesh-operator-0:1.1.11-3.el8.x86_64",
"product_id": "servicemesh-operator-0:1.1.11-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@1.1.11-3.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ior-0:1.1.11-2.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src"
},
"product_reference": "ior-0:1.1.11-2.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ior-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64"
},
"product_reference": "ior-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:1.1.11-2.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src"
},
"product_reference": "servicemesh-0:1.1.11-2.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-citadel-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:1.1.11-2.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src"
},
"product_reference": "servicemesh-cni-0:1.1.11-2.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-cni-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-galley-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-galley-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-19.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src"
},
"product_reference": "servicemesh-grafana-0:6.4.3-19.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-19.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64"
},
"product_reference": "servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64"
},
"product_reference": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:1.1.11-3.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src"
},
"product_reference": "servicemesh-operator-0:1.1.11-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:1.1.11-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64"
},
"product_reference": "servicemesh-operator-0:1.1.11-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-20.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-20.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
},
"product_reference": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-22T04:53:46+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5649"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-22T04:53:46+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5649"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
rhsa-2021:1366
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.7.9 is now available with\nupdates to packages and images that fix several bugs.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.7.9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.7.9. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHSA-2021:1365\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n-between-minor.html#understanding-upgrade-channels_updating-cluster-between\n-minor\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1366",
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "1918750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750"
},
{
"category": "external",
"summary": "1953464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953464"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1366.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.7.9 packages and security update",
"tracking": {
"current_release_date": "2025-11-06T23:53:03+00:00",
"generator": {
"date": "2025-11-06T23:53:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:1366",
"initial_release_date": "2021-05-04T19:34:17+00:00",
"revision_history": [
{
"date": "2021-05-04T19:34:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-05-04T19:34:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:53:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.7",
"product": {
"name": "Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.7::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.7",
"product": {
"name": "Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.7::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"product": {
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"product_id": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.7.0-202104250659.p0.git.7d0a2b2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"product": {
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"product_id": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.7.0-202104250659.p0.git.e1b19c2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"product": {
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"product_id": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"product": {
"name": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"product_id": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr@4.7.0-202104250659.p0.git.d49acc4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.7.0-202104250659.p0.git.95881af.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.7.0-202104250659.p0.git.95881af.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product_id": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.7.0-202104250659.p0.git.e1b19c2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product_id": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.7.0-202104250659.p0.git.e1b19c2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product": {
"name": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_id": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product": {
"name": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_id": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-common@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product": {
"name": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_id": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product": {
"name": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_id": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"product": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product_id": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src"
},
"product_reference": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src"
},
"product_reference": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src"
},
"product_reference": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src"
},
"product_reference": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
},
"product_reference": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
},
"product_reference": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
},
"product_reference": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
},
"product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7",
"product_id": "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
},
"product_reference": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-04T19:34:17+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-04T19:34:17+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-04T19:34:17+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
},
{
"cve": "CVE-2021-3114",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-01-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1918750"
}
],
"notes": [
{
"category": "description",
"text": "A flaw detected in golang: crypto/elliptic, in which P-224 keys as generated can return incorrect inputs, reducing the strength of the cryptography. The highest threat from this vulnerability is confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/elliptic: incorrect operations on the P-224 curve",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3114"
},
{
"category": "external",
"summary": "RHBZ#1918750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/mperVMGa98w",
"url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w"
}
],
"release_date": "2021-01-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-04T19:34:17+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1366"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src",
"7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64",
"7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src",
"8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src",
"8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src",
"8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x",
"8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64",
"8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src",
"8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x",
"8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64",
"8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/elliptic: incorrect operations on the P-224 curve"
}
]
}
rhsa-2020:5118
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.20 is now available with updates to packages and images that fix several bugs.\n\nThis release includes a security update for golang for Red Hat OpenShift Container Platform 4.5.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.5.20. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2020:5119\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nThis update fixes the following bug among others:\n\n* Previously, the Prometheus swagger definition contained a `$ref` property which could not be resolved. This caused a runtime error to occur when using the Prometheus operand creation form. This was fixed by adding a `definitions` property to schema returned by the `definitionFor` helper function so that the `$ref` property can resolve. There are no longer runtime errors when using the Prometheus operand creation form. (BZ#1885228)\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.5.20-x86_64\n\nThe image digest is sha256:78b878986d2d0af6037d637aa63e7b6f80fc8f17d0f0d5b077ac6aca83f792a0\n\n(For s390x architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.5.20-s390x\n\nThe image digest is sha256:372d9aea634d36704d8500a2f940edb3867bfde14c0e5aa19534ea5ac90083d4\n\n(For ppc64le architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.5.20-ppc64le\n\nThe image digest is sha256:030d8323cce90de6bc7ad4119ebb7f000bde06e742f6923faf76707ffe85634a\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5118",
"url": "https://access.redhat.com/errata/RHSA-2020:5118"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1883268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883268"
},
{
"category": "external",
"summary": "1885228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885228"
},
{
"category": "external",
"summary": "1892585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892585"
},
{
"category": "external",
"summary": "1893202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893202"
},
{
"category": "external",
"summary": "1893742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893742"
},
{
"category": "external",
"summary": "1894763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894763"
},
{
"category": "external",
"summary": "1894782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894782"
},
{
"category": "external",
"summary": "1895057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895057"
},
{
"category": "external",
"summary": "1896990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896990"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5118.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.20 bug fix and golang security update",
"tracking": {
"current_release_date": "2025-11-06T23:52:32+00:00",
"generator": {
"date": "2025-11-06T23:52:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2020:5118",
"initial_release_date": "2020-11-24T12:41:33+00:00",
"revision_history": [
{
"date": "2020-11-24T12:41:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-11-24T12:41:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:52:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"product_id": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"product_id": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"product_id": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"product": {
"name": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"product_id": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"product_id": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"product": {
"name": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"product_id": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"product": {
"name": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"product_id": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"product": {
"name": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"product_id": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.5.0-202011070210.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"product": {
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"product_id": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-ipa-downloader-rhel8\u0026tag=v4.5.0-202011070210.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"product_id": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"product_id": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le",
"product": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le",
"product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"product": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"product_id": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"product_id": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"product": {
"name": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"product_id": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"product": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"product_id": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"product": {
"name": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"product_id": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"product": {
"name": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"product_id": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"product": {
"name": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"product_id": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"product": {
"name": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"product_id": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"product": {
"name": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"product_id": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"product_id": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"product": {
"name": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"product_id": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"product": {
"name": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"product_id": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"product": {
"name": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"product_id": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"product": {
"name": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"product_id": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"product": {
"name": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"product_id": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"product": {
"name": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"product_id": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"product": {
"name": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"product_id": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"product_id": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"product_id": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"product": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"product": {
"name": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"product_id": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"product": {
"name": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"product_id": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"product_id": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"product": {
"name": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"product_id": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"product_id": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"product_id": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"product_id": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"product": {
"name": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"product_id": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"product_id": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"product_id": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"product_id": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"product": {
"name": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"product_id": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.5.0-202011132127.p0"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"product_id": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"product_id": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"product_id": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"product": {
"name": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"product_id": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"product_id": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"product": {
"name": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"product_id": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"product": {
"name": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"product_id": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"product": {
"name": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"product_id": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.5.0-202011070210.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"product": {
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"product_id": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-ipa-downloader-rhel8\u0026tag=v4.5.0-202011070210.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"product_id": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"product_id": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"product": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"product": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"product_id": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"product_id": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"product": {
"name": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"product_id": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"product": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"product_id": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"product": {
"name": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"product_id": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"product": {
"name": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"product_id": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"product": {
"name": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"product_id": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"product": {
"name": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"product_id": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"product": {
"name": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"product_id": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"product_id": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"product": {
"name": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"product_id": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"product": {
"name": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"product_id": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"product": {
"name": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"product_id": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"product": {
"name": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"product_id": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"product": {
"name": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"product_id": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"product": {
"name": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"product_id": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"product": {
"name": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"product_id": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"product": {
"name": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"product_id": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"product": {
"name": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"product_id": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"product_id": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"product_id": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"product": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"product": {
"name": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"product_id": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"product": {
"name": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"product_id": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"product_id": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"product": {
"name": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"product_id": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"product_id": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"product_id": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"product_id": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"product": {
"name": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"product_id": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"product_id": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"product_id": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"product_id": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"product": {
"name": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"product_id": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.5.0-202011132127.p0"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"product_id": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"product_id": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"product_id": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"product": {
"name": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"product_id": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"product_id": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"product": {
"name": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"product_id": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"product": {
"name": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"product_id": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"product_id": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"product_id": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"product": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"product_id": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"product_id": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"product": {
"name": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"product_id": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"product": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"product_id": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"product": {
"name": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"product_id": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"product": {
"name": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"product_id": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"product": {
"name": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"product_id": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"product": {
"name": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"product_id": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"product": {
"name": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"product_id": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"product_id": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.5.0-202011151045.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"product": {
"name": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"product_id": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"product": {
"name": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"product_id": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"product": {
"name": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"product_id": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"product": {
"name": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"product_id": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"product": {
"name": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"product_id": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"product": {
"name": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"product_id": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"product_id": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"product_id": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"product": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"product": {
"name": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"product_id": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel7\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"product": {
"name": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"product_id": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.5.0-202011121956.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"product_id": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"product": {
"name": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"product_id": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"product_id": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"product_id": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"product_id": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"product": {
"name": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"product_id": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"product_id": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.5.0-202011142223.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"product_id": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"product_id": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.5.0-202011132127.p0"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"product": {
"name": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"product_id": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.5.0-202011132127.p0"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64"
},
"product_reference": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64"
},
"product_reference": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x"
},
"product_reference": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le"
},
"product_reference": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64"
},
"product_reference": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le"
},
"product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x"
},
"product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64"
},
"product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64"
},
"product_reference": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le"
},
"product_reference": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x"
},
"product_reference": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x"
},
"product_reference": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64"
},
"product_reference": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le"
},
"product_reference": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64"
},
"product_reference": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x"
},
"product_reference": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le"
},
"product_reference": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le"
},
"product_reference": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x"
},
"product_reference": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64"
},
"product_reference": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64"
},
"product_reference": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x"
},
"product_reference": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le"
},
"product_reference": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x"
},
"product_reference": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le"
},
"product_reference": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64"
},
"product_reference": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le"
},
"product_reference": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64"
},
"product_reference": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x"
},
"product_reference": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x"
},
"product_reference": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64"
},
"product_reference": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le"
},
"product_reference": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le"
},
"product_reference": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x"
},
"product_reference": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64"
},
"product_reference": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x"
},
"product_reference": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64"
},
"product_reference": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le"
},
"product_reference": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le"
},
"product_reference": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x"
},
"product_reference": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64"
},
"product_reference": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x"
},
"product_reference": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64"
},
"product_reference": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le"
},
"product_reference": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le"
},
"product_reference": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64"
},
"product_reference": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64"
},
"product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le"
},
"product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x"
},
"product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64"
},
"product_reference": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x"
},
"product_reference": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le"
},
"product_reference": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64"
},
"product_reference": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le"
},
"product_reference": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x"
},
"product_reference": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x"
},
"product_reference": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64"
},
"product_reference": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le"
},
"product_reference": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64"
},
"product_reference": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x"
},
"product_reference": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le"
},
"product_reference": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le"
},
"product_reference": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x"
},
"product_reference": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64"
},
"product_reference": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64"
},
"product_reference": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x"
},
"product_reference": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le"
},
"product_reference": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le"
},
"product_reference": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64"
},
"product_reference": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x"
},
"product_reference": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le"
},
"product_reference": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x"
},
"product_reference": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64"
},
"product_reference": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64"
},
"product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le"
},
"product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le"
},
"product_reference": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64"
},
"product_reference": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64"
},
"product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
},
"product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-24T12:41:33+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5118"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-24T12:41:33+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5118"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64",
"7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x",
"7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64",
"8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le",
"8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64",
"8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
RHSA-2021:1515
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Openshift Logging Bug Fix Release (5.0.3)\nThis release includes a security update.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Openshift Logging Bug Fix Release (5.0.3)\n\nSecurity Fix(es):\n\n* jackson-databind: arbitrary code execution in slf4j-ext class\n(CVE-2018-14718)\n\n* jackson-databind: arbitrary code execution in blaze-ds-opt and\nblaze-ds-core classes (CVE-2018-14719)\n\n* jackson-databind: improper polymorphic deserialization in\naxis2-transport-jms class (CVE-2018-19360)\n\n* jackson-databind: improper polymorphic deserialization in openjpa class\n(CVE-2018-19361)\n\n* jackson-databind: improper polymorphic deserialization in\njboss-common-core class (CVE-2018-19362)\n\n* jackson-databind: default typing mishandling leading to remote code\nexecution (CVE-2019-14379)\n\n* jackson-databind: Serialization gadgets in\ncom.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.datasources.PerUserPoolDataSource (CVE-2020-35490)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.datasources.SharedPoolDataSource (CVE-2020-35491)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool\n(CVE-2020-35728)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\noadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS (CVE-2020-36179)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS (CVE-2020-36180)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS (CVE-2020-36181)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS (CVE-2020-36182)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-36183)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource\n(CVE-2020-36184)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource\n(CVE-2020-36185)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource\n(CVE-2020-36186)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource\n(CVE-2020-36187)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource\n(CVE-2020-36188)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSourc\ne (CVE-2020-36189)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to javax.swing (CVE-2021-20190)\n\n* jackson-databind: exfiltration/XXE in some JDK classes (CVE-2018-14720)\n\n* jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class\n(CVE-2018-14721)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1515",
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "LOG-1224",
"url": "https://issues.redhat.com/browse/LOG-1224"
},
{
"category": "external",
"summary": "LOG-1232",
"url": "https://issues.redhat.com/browse/LOG-1232"
},
{
"category": "external",
"summary": "LOG-1234",
"url": "https://issues.redhat.com/browse/LOG-1234"
},
{
"category": "external",
"summary": "LOG-1299",
"url": "https://issues.redhat.com/browse/LOG-1299"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1515.json"
}
],
"title": "Red Hat Security Advisory: Openshift Logging Bug Fix Release (5.0.3)",
"tracking": {
"current_release_date": "2025-11-06T23:53:04+00:00",
"generator": {
"date": "2025-11-06T23:53:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2021:1515",
"initial_release_date": "2021-05-06T13:38:14+00:00",
"revision_history": [
{
"date": "2021-05-06T13:38:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-05-06T13:38:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:53:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Logging 5.0",
"product": {
"name": "OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"product_id": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"product_id": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.0.3-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"product": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.0.3-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"product_id": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"product_id": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64"
},
"product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64 as a component of OpenShift Logging 5.0",
"product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64",
"relates_to_product_reference": "8Base-OSE-LOGGING-5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-14718",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666415"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using slf4j classes. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: arbitrary code execution in slf4j-ext class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in jackson-databind involves exploiting CVE-2018-1088 against slf4j, which was fixed in Red Hat products through the errata referenced at https://access.redhat.com/security/cve/cve-2018-8088. Applications that link only slf4j versions including that fix are not vulnerable to this vulnerability.\n\nRed Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle slf4j-ext jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14718"
},
{
"category": "external",
"summary": "RHBZ#1666415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14718",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718"
}
],
"release_date": "2018-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: arbitrary code execution in slf4j-ext class"
},
{
"cve": "CVE-2018-14719",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666418"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using blaze classes. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products are not affected by this issue as they do not bundle or provide the requisite gadget jars to exploit this vulnerability:\nRed Hat Satellite 6\nRed Hat Enterprise Virtualization 4\nRed Hat Fuse 6, 7, and Fuse Integration Services 2\nRed Hat A-MQ 6",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14719"
},
{
"category": "external",
"summary": "RHBZ#1666418",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14719",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719"
}
],
"release_date": "2018-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes"
},
{
"cve": "CVE-2018-14720",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666423"
}
],
"notes": [
{
"category": "description",
"text": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: exfiltration/XXE in some JDK classes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.\n\nRed Hat Enterprise Virtualization 4 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14720"
},
{
"category": "external",
"summary": "RHBZ#1666423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14720",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720"
}
],
"release_date": "2018-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible \n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: exfiltration/XXE in some JDK classes"
},
{
"cve": "CVE-2018-14721",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666428"
}
],
"notes": [
{
"category": "description",
"text": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle axis2-jaxws jar.\n\nRed Hat Virtualization is not affected by this issue, since its does not bundle axis2-jaxws jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14721"
},
{
"category": "external",
"summary": "RHBZ#1666428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721"
}
],
"release_date": "2018-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class"
},
{
"cve": "CVE-2018-19360",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the axis2-transport-jms class. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t include axis2-transport-jms jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include axis2-transport-jms jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-19360"
},
{
"category": "external",
"summary": "RHBZ#1666482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-19360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19360"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360"
}
],
"release_date": "2018-11-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class"
},
{
"cve": "CVE-2018-19361",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666484"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the OpenJPA class. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: improper polymorphic deserialization in openjpa class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-19361"
},
{
"category": "external",
"summary": "RHBZ#1666484",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-19361",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19361"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361"
}
],
"release_date": "2018-11-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: improper polymorphic deserialization in openjpa class"
},
{
"cve": "CVE-2018-19362",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1666489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the jboss-common-core class. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: improper polymorphic deserialization in jboss-common-core class",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-19362"
},
{
"category": "external",
"summary": "RHBZ#1666489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-19362",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362"
}
],
"release_date": "2018-11-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: improper polymorphic deserialization in jboss-common-core class"
},
{
"cve": "CVE-2019-14379",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2019-07-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1737517"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: default typing mishandling leading to remote code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14379"
},
{
"category": "external",
"summary": "RHBZ#1737517",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14379"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379"
}
],
"release_date": "2019-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: default typing mishandling leading to remote code execution"
},
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
},
{
"cve": "CVE-2020-24750",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2020-09-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1882310"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.6. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* OpenShift Container Platform\nThese products may update the jackson-databind dependency in a future release.\n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24750"
},
{
"category": "external",
"summary": "RHBZ#1882310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750"
}
],
"release_date": "2020-09-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid com.pastdev.httpcomponents in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration"
},
{
"cve": "CVE-2020-35490",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2020-12-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1909266"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update.\n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35490"
},
{
"category": "external",
"summary": "RHBZ#1909266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909266"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35490",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35490"
},
{
"category": "external",
"summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
"url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2986",
"url": "https://github.com/FasterXML/jackson-databind/issues/2986"
}
],
"release_date": "2020-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid org.apache.commons.dbcp2.datasources.PerUserPoolDataSource and org.apache.commons.dbcp2.datasources.SharedPoolDataSource in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource"
},
{
"cve": "CVE-2020-35491",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2020-12-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1909269"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35491"
},
{
"category": "external",
"summary": "RHBZ#1909269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909269"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35491",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35491"
},
{
"category": "external",
"summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
"url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2986",
"url": "https://github.com/FasterXML/jackson-databind/issues/2986"
}
],
"release_date": "2020-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid org.apache.commons.dbcp2.datasources.PerUserPoolDataSource and org.apache.commons.dbcp2.datasources.SharedPoolDataSource in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource"
},
{
"cve": "CVE-2020-35728",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2020-12-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1911502"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat Products ship jackson-databind version 2.10.0 or later which is not considered affected by this CVE (see https://medium.com/@cowtowncoder/jackson-2-10-safe-default-typing-2d018f0ce2ba) \n* JBoss Data Grid 7\n* JBoss Data Grid 8\n* Enterprise Application Platform 7\n* Red Hat Decision Manager 7\n* Red Hat Process Automation Manager 7\n* Red Hat Single Sign-On (RH-SSO) 7\n* Red Hat JBoss Fuse 7\n* Red Hat JBoss A-MQ\n* Red Hat Enterprise Linux 8\n* Red Hat Satellite 6.6\n* Red Hat Satellite 6.7\n* Red Hat Satellite 6.8\n* Red Hat CodeReady Studio 12\n\nRed Hat OpenShift Container Platform and Red Hat OpenStack Platform does ship the vulnerable components, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update.\n\nRed Hat OpenStack Platform 13 ships OpenDaylight, which contains the vulnerable jackson-databind, but does not expose jackson-databind in a way that would make it exploitable. As such, Red Hat will not be providing a fix for OpenDaylight at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35728"
},
{
"category": "external",
"summary": "RHBZ#1911502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35728"
},
{
"category": "external",
"summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
"url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2999",
"url": "https://github.com/FasterXML/jackson-databind/issues/2999"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool"
},
{
"cve": "CVE-2020-36179",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913871"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36179"
},
{
"category": "external",
"summary": "RHBZ#1913871",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913871"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36179",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36179"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3004",
"url": "https://github.com/FasterXML/jackson-databind/issues/3004"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS"
},
{
"cve": "CVE-2020-36180",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36180"
},
{
"category": "external",
"summary": "RHBZ#1913872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36180",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36180"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3004",
"url": "https://github.com/FasterXML/jackson-databind/issues/3004"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS"
},
{
"cve": "CVE-2020-36181",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913874"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but does not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36181"
},
{
"category": "external",
"summary": "RHBZ#1913874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913874"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36181",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36181"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3004",
"url": "https://github.com/FasterXML/jackson-databind/issues/3004"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS"
},
{
"cve": "CVE-2020-36182",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913926"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36182"
},
{
"category": "external",
"summary": "RHBZ#1913926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913926"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36182",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36182"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3004",
"url": "https://github.com/FasterXML/jackson-databind/issues/3004"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS"
},
{
"cve": "CVE-2020-36183",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913927"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36183"
},
{
"category": "external",
"summary": "RHBZ#1913927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36183"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/3003",
"url": "https://github.com/FasterXML/jackson-databind/issues/3003"
}
],
"release_date": "2020-12-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool"
},
{
"cve": "CVE-2020-36184",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913928"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36184"
},
{
"category": "external",
"summary": "RHBZ#1913928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36184",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36184"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2998",
"url": "https://github.com/FasterXML/jackson-databind/issues/2998"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource"
},
{
"cve": "CVE-2020-36185",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913929"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36185"
},
{
"category": "external",
"summary": "RHBZ#1913929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913929"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36185"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2998",
"url": "https://github.com/FasterXML/jackson-databind/issues/2998"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource"
},
{
"cve": "CVE-2020-36186",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913931"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contain the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36186"
},
{
"category": "external",
"summary": "RHBZ#1913931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36186"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2997",
"url": "https://github.com/FasterXML/jackson-databind/issues/2997"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource"
},
{
"cve": "CVE-2020-36187",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913933"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contain the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36187"
},
{
"category": "external",
"summary": "RHBZ#1913933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913933"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36187",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36187"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2997",
"url": "https://github.com/FasterXML/jackson-databind/issues/2997"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource"
},
{
"cve": "CVE-2020-36188",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913934"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but they do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36188"
},
{
"category": "external",
"summary": "RHBZ#1913934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36188"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2996",
"url": "https://github.com/FasterXML/jackson-databind/issues/2996"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource"
},
{
"cve": "CVE-2020-36189",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913937"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36189"
},
{
"category": "external",
"summary": "RHBZ#1913937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913937"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36189"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-databind/issues/2996",
"url": "https://github.com/FasterXML/jackson-databind/issues/2996"
}
],
"release_date": "2020-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource"
},
{
"cve": "CVE-2021-20190",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2020-01-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1916633"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* CodeReady WorkSpaces Server Container\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"known_not_affected": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20190"
},
{
"category": "external",
"summary": "RHBZ#1916633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20190"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-5949-rw7g-wx7w",
"url": "https://github.com/advisories/GHSA-5949-rw7g-wx7w"
}
],
"release_date": "2021-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-06T13:38:14+00:00",
"details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1515"
},
{
"category": "workaround",
"details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid javax.swing in the classpath",
"product_ids": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64",
"8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x",
"8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing"
}
]
}
rhsa-2020_5119
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.5.20 is now available with updates to packages and images that fix several bugs.\n\nThis release also includes a security update for golang for Red Hat OpenShift Container Platform 4.5.20.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nSecurity Fix(es):\n\n* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.5.20. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2020:5118\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.[y]/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5119",
"url": "https://access.redhat.com/errata/RHSA-2020:5119"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "1897972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897972"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5119.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.20 packages and golang security update",
"tracking": {
"current_release_date": "2024-11-13T22:17:11+00:00",
"generator": {
"date": "2024-11-13T22:17:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2020:5119",
"initial_release_date": "2020-11-24T11:57:51+00:00",
"revision_history": [
{
"date": "2020-11-24T11:57:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-11-24T11:57:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:17:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.5",
"product": {
"name": "Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.ppc64le",
"product": {
"name": "faq-0:0.0.6-5.el7.ppc64le",
"product_id": "faq-0:0.0.6-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-4.rhaos4.5.git6dee389.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.s390x",
"product": {
"name": "faq-0:0.0.6-5.el7.s390x",
"product_id": "faq-0:0.0.6-5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_id": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-4.rhaos4.5.git6dee389.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.x86_64",
"product": {
"name": "faq-0:0.0.6-5.el7.x86_64",
"product_id": "faq-0:0.0.6-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product": {
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product_id": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-4.rhaos4.5.git6dee389.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "faq-0:0.0.6-5.el7.src",
"product": {
"name": "faq-0:0.0.6-5.el7.src",
"product_id": "faq-0:0.0.6-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"product": {
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"product_id": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"product": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"product": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"product": {
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"product_id": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202011121956.p0.git.0.7093c82.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"product": {
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"product_id": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"product": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"product": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product_id": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202011121956.p0.git.0.7093c82.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product_id": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.5.0-202011121956.p0.git.0.7093c82.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64"
},
"product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64"
},
"product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le"
},
"product_reference": "faq-0:0.0.6-5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x"
},
"product_reference": "faq-0:0.0.6-5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src"
},
"product_reference": "faq-0:0.0.6-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64"
},
"product_reference": "faq-0:0.0.6-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "faq-debuginfo-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64"
},
"product_reference": "faq-debuginfo-0:0.0.6-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src"
},
"product_reference": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src"
},
"product_reference": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
},
"product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src"
},
"product_reference": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5",
"product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15586",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856953"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "RHBZ#1856953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ",
"url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ"
}
],
"release_date": "2020-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-24T11:57:51+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS"
},
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1867099"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src",
"7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src",
"7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x",
"7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src",
"7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x",
"7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64",
"8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src",
"8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x",
"8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "RHBZ#1867099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo",
"url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo"
}
],
"release_date": "2020-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-24T11:57:51+00:00",
"details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.",
"product_ids": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src",
"7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x",
"7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src",
"8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x",
"8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs"
}
]
}
CERTFR-2023-AVI-0976
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | Services Web IBM Sterling Connect:Direct versions 6.2.x antérieures à 6.2.0.20 | ||
| IBM | Sterling Connect:Direct | Interface utilisateur IBM Sterling Connect:Direct versions 1.x antérieures à 1.5.0.2 iFix-39 | ||
| IBM | QRadar | Agent QRadar WinCollect (Standalone) versions antérieures à 10.1.8 | ||
| IBM | Sterling Connect:Direct | Services Web IBM Sterling Connect:Direct versions 6.0.x à 6.1.x antérieures à 6.1.0.22 | ||
| IBM | QRadar | Suite QRadar versions 1.10.x antérieures à 1.10.17.0 | ||
| IBM | Sterling | IBM Sterling B2B Integrator versions 6.0.x antérieures à 6.0.3.9 | ||
| IBM | Sterling | IBM Sterling B2B Integrator versions 6.1.0.x à 6.1.2.x antérieures à 6.1.2.3 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions 1.10.x antérieures à 1.10.17.0 | ||
| IBM | Sterling Connect:Direct | Services Web IBM Sterling Connect:Direct versions 6.3.x antérieures à 6.3.0.5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Services Web IBM Sterling Connect:Direct versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.20",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Interface utilisateur IBM Sterling Connect:Direct versions 1.x ant\u00e9rieures \u00e0 1.5.0.2 iFix-39",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Agent QRadar WinCollect (Standalone) versions ant\u00e9rieures \u00e0 10.1.8",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Services Web IBM Sterling Connect:Direct versions 6.0.x \u00e0 6.1.x ant\u00e9rieures \u00e0 6.1.0.22",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Suite QRadar versions 1.10.x ant\u00e9rieures \u00e0 1.10.17.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling B2B Integrator versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling B2B Integrator versions 6.1.0.x \u00e0 6.1.2.x ant\u00e9rieures \u00e0 6.1.2.3",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions 1.10.x ant\u00e9rieures \u00e0 1.10.17.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Services Web IBM Sterling Connect:Direct versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.5",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2021-37701",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37701"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-36313",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36313"
},
{
"name": "CVE-2021-42248",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42248"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2021-32804",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32804"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2020-28367",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28367"
},
{
"name": "CVE-2022-41966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41966"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-26279",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26279"
},
{
"name": "CVE-2022-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40153"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2022-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40152"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2021-32803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32803"
},
{
"name": "CVE-2022-40151",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40151"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36777"
},
{
"name": "CVE-2023-32001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32001"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2017-18640",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18640"
},
{
"name": "CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"name": "CVE-2023-34104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34104"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2020-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24553"
},
{
"name": "CVE-2021-42836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42836"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2022-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40156"
},
{
"name": "CVE-2022-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40155"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2023-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41080"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2021-39008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39008"
},
{
"name": "CVE-2020-14039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14039"
},
{
"name": "CVE-2022-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40154"
},
{
"name": "CVE-2020-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28366"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
}
],
"initial_release_date": "2023-11-23T00:00:00",
"last_revision_date": "2023-11-23T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0976",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-11-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080118 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080118"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080174 du 21 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080174"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080106 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080106"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080058 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080058"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080117 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080117"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080177 du 21 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080177"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080176 du 21 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080176"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7081403 du 22 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7081403"
}
]
}
CERTFR-2024-AVI-0145
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | N/A | IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions antérieures à v4.8.2 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 IF05 | ||
| IBM | QRadar | IBM QRadar Use Case Manager App versions antérieures à 3.9.0 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | WebSphere | IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.1.x.x antérieures à 6.1.0.23 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.3.x.x antérieures à 6.3.0.6 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.2.x.x antérieures à 6.2.0.22 | ||
| IBM | Db2 | IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | Cloud Pak | IBM Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.x.x antérieures à 5.1.2.15 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | QRadar WinCollect Agent | IBM QRadar WinCollect Agent versions 10.0.x antérieures à 10.1.9 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.3.x antérieures à 5.1.9.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7 IF05",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Use Case Manager App versions ant\u00e9rieures \u00e0 3.9.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.1.x.x ant\u00e9rieures \u00e0 6.1.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.3.x.x ant\u00e9rieures \u00e0 6.3.0.6",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.22",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.x.x ant\u00e9rieures \u00e0 5.1.2.15",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar WinCollect Agent versions 10.0.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "QRadar WinCollect Agent",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.3.x ant\u00e9rieures \u00e0 5.1.9.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2021-41190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41190"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2022-43548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43548"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29244"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2020-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8244"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2022-48339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"name": "CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"name": "CVE-2020-14039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14039"
},
{
"name": "CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"name": "CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"name": "CVE-2020-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24553"
},
{
"name": "CVE-2020-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28366"
},
{
"name": "CVE-2020-28367",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28367"
},
{
"name": "CVE-2023-34054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34054"
},
{
"name": "CVE-2023-34053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34053"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2002-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-0059"
},
{
"name": "CVE-2023-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38003"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2015-8393",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8393"
},
{
"name": "CVE-2020-19909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19909"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2023-47145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47145"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-46308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46308"
},
{
"name": "CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"name": "CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-23541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23541"
},
{
"name": "CVE-2022-36046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
},
{
"name": "CVE-2023-40692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40692"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2023-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38727"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2022-48337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
},
{
"name": "CVE-2023-47627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
},
{
"name": "CVE-2023-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47701"
},
{
"name": "CVE-2023-49081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49081"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2023-29258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29258"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-22190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22190"
},
{
"name": "CVE-2023-4586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4586"
},
{
"name": "CVE-2023-43020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43020"
},
{
"name": "CVE-2023-37276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
},
{
"name": "CVE-2023-47152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47152"
},
{
"name": "CVE-2023-49082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49082"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47141"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2023-46167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46167"
},
{
"name": "CVE-2023-27859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27859"
},
{
"name": "CVE-2023-47158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47158"
},
{
"name": "CVE-2023-36665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36665"
},
{
"name": "CVE-2022-23529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23529"
},
{
"name": "CVE-2023-40687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40687"
},
{
"name": "CVE-2022-23539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23539"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2022-23540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23540"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-50308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50308"
},
{
"name": "CVE-2023-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39331"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2023-45193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45193"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2020-29510",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29510"
},
{
"name": "CVE-2023-47746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47746"
},
{
"name": "CVE-2023-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34062"
},
{
"name": "CVE-2023-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47747"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
}
],
"initial_release_date": "2024-02-16T00:00:00",
"last_revision_date": "2024-02-16T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0145",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117872 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117872"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118592 du 16 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118592"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117873 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117873"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118289 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118289"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118351 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118351"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117821 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117821"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117883 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117883"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117881 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117881"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117884 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117884"
}
]
}
ghsa-q6gq-997w-f55g
Vulnerability from github
Withdrawn Advisory
This advisory has been withdrawn because alerts cannot be issued for the Go standard library at this time.
Original Description
Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/ulikunitz/xz"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.5.8"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2020-16845"
],
"database_specific": {
"cwe_ids": [
"CWE-835"
],
"github_reviewed": true,
"github_reviewed_at": "2021-06-18T22:05:40Z",
"nvd_published_at": "2020-08-06T18:15:00Z",
"severity": "HIGH"
},
"details": "### Withdrawn Advisory\nThis advisory has been withdrawn because alerts cannot be issued for the Go standard library at this time.\n\n### Original Description\nGo before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.",
"id": "GHSA-q6gq-997w-f55g",
"modified": "2025-10-14T19:37:19Z",
"published": "2021-12-16T19:16:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
},
{
"type": "WEB",
"url": "https://github.com/ulikunitz/xz/issues/35"
},
{
"type": "WEB",
"url": "https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b"
},
{
"type": "WEB",
"url": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo"
},
{
"type": "WEB",
"url": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20200924-0002"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2021/dsa-4848"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Withdrawn Advisory: Infinite loop in xz",
"withdrawn": "2025-10-14T19:37:18Z"
}
opensuse-su-2024:10806-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.13-1.13.15-2.6 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.13-1.13.15-2.6 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10806",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10806-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16276 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16276/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17596 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17596/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14039 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16845 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16845/"
}
],
"title": "go1.13-1.13.15-2.6 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10806-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.13-1.13.15-2.6.aarch64",
"product": {
"name": "go1.13-1.13.15-2.6.aarch64",
"product_id": "go1.13-1.13.15-2.6.aarch64"
}
},
{
"category": "product_version",
"name": "go1.13-doc-1.13.15-2.6.aarch64",
"product": {
"name": "go1.13-doc-1.13.15-2.6.aarch64",
"product_id": "go1.13-doc-1.13.15-2.6.aarch64"
}
},
{
"category": "product_version",
"name": "go1.13-race-1.13.15-2.6.aarch64",
"product": {
"name": "go1.13-race-1.13.15-2.6.aarch64",
"product_id": "go1.13-race-1.13.15-2.6.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.13-1.13.15-2.6.ppc64le",
"product": {
"name": "go1.13-1.13.15-2.6.ppc64le",
"product_id": "go1.13-1.13.15-2.6.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.13-doc-1.13.15-2.6.ppc64le",
"product": {
"name": "go1.13-doc-1.13.15-2.6.ppc64le",
"product_id": "go1.13-doc-1.13.15-2.6.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.13-race-1.13.15-2.6.ppc64le",
"product": {
"name": "go1.13-race-1.13.15-2.6.ppc64le",
"product_id": "go1.13-race-1.13.15-2.6.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.13-1.13.15-2.6.s390x",
"product": {
"name": "go1.13-1.13.15-2.6.s390x",
"product_id": "go1.13-1.13.15-2.6.s390x"
}
},
{
"category": "product_version",
"name": "go1.13-doc-1.13.15-2.6.s390x",
"product": {
"name": "go1.13-doc-1.13.15-2.6.s390x",
"product_id": "go1.13-doc-1.13.15-2.6.s390x"
}
},
{
"category": "product_version",
"name": "go1.13-race-1.13.15-2.6.s390x",
"product": {
"name": "go1.13-race-1.13.15-2.6.s390x",
"product_id": "go1.13-race-1.13.15-2.6.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.13-1.13.15-2.6.x86_64",
"product": {
"name": "go1.13-1.13.15-2.6.x86_64",
"product_id": "go1.13-1.13.15-2.6.x86_64"
}
},
{
"category": "product_version",
"name": "go1.13-doc-1.13.15-2.6.x86_64",
"product": {
"name": "go1.13-doc-1.13.15-2.6.x86_64",
"product_id": "go1.13-doc-1.13.15-2.6.x86_64"
}
},
{
"category": "product_version",
"name": "go1.13-race-1.13.15-2.6.x86_64",
"product": {
"name": "go1.13-race-1.13.15-2.6.x86_64",
"product_id": "go1.13-race-1.13.15-2.6.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-1.13.15-2.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64"
},
"product_reference": "go1.13-1.13.15-2.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-1.13.15-2.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le"
},
"product_reference": "go1.13-1.13.15-2.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-1.13.15-2.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x"
},
"product_reference": "go1.13-1.13.15-2.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-1.13.15-2.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64"
},
"product_reference": "go1.13-1.13.15-2.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-doc-1.13.15-2.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64"
},
"product_reference": "go1.13-doc-1.13.15-2.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-doc-1.13.15-2.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le"
},
"product_reference": "go1.13-doc-1.13.15-2.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-doc-1.13.15-2.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x"
},
"product_reference": "go1.13-doc-1.13.15-2.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-doc-1.13.15-2.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64"
},
"product_reference": "go1.13-doc-1.13.15-2.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-race-1.13.15-2.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64"
},
"product_reference": "go1.13-race-1.13.15-2.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-race-1.13.15-2.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le"
},
"product_reference": "go1.13-race-1.13.15-2.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-race-1.13.15-2.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x"
},
"product_reference": "go1.13-race-1.13.15-2.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-race-1.13.15-2.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
},
"product_reference": "go1.13-race-1.13.15-2.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-16276",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16276"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16276",
"url": "https://www.suse.com/security/cve/CVE-2019-16276"
},
{
"category": "external",
"summary": "SUSE Bug 1152082 for CVE-2019-16276",
"url": "https://bugzilla.suse.com/1152082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16276"
},
{
"cve": "CVE-2019-17596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17596"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17596",
"url": "https://www.suse.com/security/cve/CVE-2019-17596"
},
{
"category": "external",
"summary": "SUSE Bug 1154402 for CVE-2019-17596",
"url": "https://bugzilla.suse.com/1154402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17596"
},
{
"cve": "CVE-2020-14039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14039"
}
],
"notes": [
{
"category": "general",
"text": "In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14039",
"url": "https://www.suse.com/security/cve/CVE-2020-14039"
},
{
"category": "external",
"summary": "SUSE Bug 1174191 for CVE-2020-14039",
"url": "https://bugzilla.suse.com/1174191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14039"
},
{
"cve": "CVE-2020-15586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15586"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15586",
"url": "https://www.suse.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "SUSE Bug 1174153 for CVE-2020-15586",
"url": "https://bugzilla.suse.com/1174153"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-15586"
},
{
"cve": "CVE-2020-16845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16845"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16845",
"url": "https://www.suse.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "SUSE Bug 1174977 for CVE-2020-16845",
"url": "https://bugzilla.suse.com/1174977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
"openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16845"
}
]
}
opensuse-su-2020:1407-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.14",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.14 fixes the following issues:\n\n- go1.14 was updated to version 1.14.7 \n- CVE-2020-16845: dUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (bsc#1174977).\t \n\n- go1.14.6 (released 2020-07-16) includes fixes to the go command,\n the compiler, the linker, vet, and the database/sql,\n encoding/json, net/http, reflect, and testing packages.\n Refs bsc#1164903 go1.14 release tracking\n Refs bsc#1174153 bsc#1174191\n * go#39991 runtime: missing deferreturn on linux/ppc64le\n * go#39920 net/http: panic on misformed If-None-Match Header with http.ServeContent\n * go#39849 cmd/compile: internal compile error when using sync.Pool: mismatched zero/store sizes\n * go#39824 cmd/go: TestBuildIDContainsArchModeEnv/386 fails on linux/386 in Go 1.14 and 1.13, not 1.15\n * go#39698 reflect: panic from malloc after MakeFunc function returns value that is also stored globally\n * go#39636 reflect: DeepEqual can return true for values that are not equal\n * go#39585 encoding/json: incorrect object key unmarshaling when using custom TextUnmarshaler as Key with string va\nlues\n * go#39562 cmd/compile/internal/ssa: TestNexting/dlv-dbg-hist failing on linux-386-longtest builder because it trie\ns to use an older version of dlv which only supports linux/amd64\n * go#39308 testing: streaming output loses parallel subtest associations\n * go#39288 cmd/vet: update for new number formats\n * go#39101 database/sql: context cancellation allows statements to execute after rollback\n * go#38030 doc: BuildNameToCertificate deprecated in go 1.14 not mentioned in the release notes\n * go#40212 net/http: Expect 100-continue panics in httputil.ReverseProxy bsc#1174153 CVE-2020-15586\n * go#40210 crypto/x509: Certificate.Verify method seemingly ignoring EKU requirements on Windows bsc#1174191 CVE-2020-14039 (Windows only)\n- Add patch to ensure /etc/hosts is used if /etc/nsswitch.conf is\n not present bsc#1172868 gh#golang/go#35305\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-1407",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1407-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:1407-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U3IHSSMDNFW647PZERRLZDGVMXZUQPNM/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:1407-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U3IHSSMDNFW647PZERRLZDGVMXZUQPNM/"
},
{
"category": "self",
"summary": "SUSE Bug 1164903",
"url": "https://bugzilla.suse.com/1164903"
},
{
"category": "self",
"summary": "SUSE Bug 1169832",
"url": "https://bugzilla.suse.com/1169832"
},
{
"category": "self",
"summary": "SUSE Bug 1170826",
"url": "https://bugzilla.suse.com/1170826"
},
{
"category": "self",
"summary": "SUSE Bug 1172868",
"url": "https://bugzilla.suse.com/1172868"
},
{
"category": "self",
"summary": "SUSE Bug 1174153",
"url": "https://bugzilla.suse.com/1174153"
},
{
"category": "self",
"summary": "SUSE Bug 1174191",
"url": "https://bugzilla.suse.com/1174191"
},
{
"category": "self",
"summary": "SUSE Bug 1174977",
"url": "https://bugzilla.suse.com/1174977"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14039 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16845 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16845/"
}
],
"title": "Security update for go1.14",
"tracking": {
"current_release_date": "2020-09-11T04:23:21Z",
"generator": {
"date": "2020-09-11T04:23:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:1407-1",
"initial_release_date": "2020-09-11T04:23:21Z",
"revision_history": [
{
"date": "2020-09-11T04:23:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.7-lp152.2.3.1.x86_64",
"product": {
"name": "go1.14-1.14.7-lp152.2.3.1.x86_64",
"product_id": "go1.14-1.14.7-lp152.2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.7-lp152.2.3.1.x86_64",
"product": {
"name": "go1.14-doc-1.14.7-lp152.2.3.1.x86_64",
"product_id": "go1.14-doc-1.14.7-lp152.2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.14-race-1.14.7-lp152.2.3.1.x86_64",
"product": {
"name": "go1.14-race-1.14.7-lp152.2.3.1.x86_64",
"product_id": "go1.14-race-1.14.7-lp152.2.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.7-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:go1.14-1.14.7-lp152.2.3.1.x86_64"
},
"product_reference": "go1.14-1.14.7-lp152.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.7-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:go1.14-doc-1.14.7-lp152.2.3.1.x86_64"
},
"product_reference": "go1.14-doc-1.14.7-lp152.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-race-1.14.7-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:go1.14-race-1.14.7-lp152.2.3.1.x86_64"
},
"product_reference": "go1.14-race-1.14.7-lp152.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14039"
}
],
"notes": [
{
"category": "general",
"text": "In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:go1.14-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.7-lp152.2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14039",
"url": "https://www.suse.com/security/cve/CVE-2020-14039"
},
{
"category": "external",
"summary": "SUSE Bug 1174191 for CVE-2020-14039",
"url": "https://bugzilla.suse.com/1174191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:go1.14-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.7-lp152.2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:go1.14-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.7-lp152.2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-11T04:23:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-14039"
},
{
"cve": "CVE-2020-15586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15586"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:go1.14-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.7-lp152.2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15586",
"url": "https://www.suse.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "SUSE Bug 1174153 for CVE-2020-15586",
"url": "https://bugzilla.suse.com/1174153"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:go1.14-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.7-lp152.2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:go1.14-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.7-lp152.2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-11T04:23:21Z",
"details": "important"
}
],
"title": "CVE-2020-15586"
},
{
"cve": "CVE-2020-16845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16845"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:go1.14-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.7-lp152.2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16845",
"url": "https://www.suse.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "SUSE Bug 1174977 for CVE-2020-16845",
"url": "https://bugzilla.suse.com/1174977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:go1.14-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.7-lp152.2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:go1.14-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.7-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.7-lp152.2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-11T04:23:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-16845"
}
]
}
opensuse-su-2020:1178-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.13",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.13 fixes the following issues:\n\n- go1.13 was updated to version 1.13.5 \n- CVE-2020-16845: dUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (bsc#1174977).\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-1178",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1178-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:1178-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTKKA7ADT427537ZHXUCOBP56XN63G5Z/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:1178-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTKKA7ADT427537ZHXUCOBP56XN63G5Z/"
},
{
"category": "self",
"summary": "SUSE Bug 1149259",
"url": "https://bugzilla.suse.com/1149259"
},
{
"category": "self",
"summary": "SUSE Bug 1174977",
"url": "https://bugzilla.suse.com/1174977"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16845 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16845/"
}
],
"title": "Security update for go1.13",
"tracking": {
"current_release_date": "2020-08-10T18:20:07Z",
"generator": {
"date": "2020-08-10T18:20:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:1178-1",
"initial_release_date": "2020-08-10T18:20:07Z",
"revision_history": [
{
"date": "2020-08-10T18:20:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.13-1.13.15-lp151.8.1.x86_64",
"product": {
"name": "go1.13-1.13.15-lp151.8.1.x86_64",
"product_id": "go1.13-1.13.15-lp151.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.13-doc-1.13.15-lp151.8.1.x86_64",
"product": {
"name": "go1.13-doc-1.13.15-lp151.8.1.x86_64",
"product_id": "go1.13-doc-1.13.15-lp151.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.13-race-1.13.15-lp151.8.1.x86_64",
"product": {
"name": "go1.13-race-1.13.15-lp151.8.1.x86_64",
"product_id": "go1.13-race-1.13.15-lp151.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-1.13.15-lp151.8.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:go1.13-1.13.15-lp151.8.1.x86_64"
},
"product_reference": "go1.13-1.13.15-lp151.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-doc-1.13.15-lp151.8.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:go1.13-doc-1.13.15-lp151.8.1.x86_64"
},
"product_reference": "go1.13-doc-1.13.15-lp151.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-race-1.13.15-lp151.8.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:go1.13-race-1.13.15-lp151.8.1.x86_64"
},
"product_reference": "go1.13-race-1.13.15-lp151.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-16845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16845"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:go1.13-1.13.15-lp151.8.1.x86_64",
"openSUSE Leap 15.1:go1.13-doc-1.13.15-lp151.8.1.x86_64",
"openSUSE Leap 15.1:go1.13-race-1.13.15-lp151.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16845",
"url": "https://www.suse.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "SUSE Bug 1174977 for CVE-2020-16845",
"url": "https://bugzilla.suse.com/1174977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:go1.13-1.13.15-lp151.8.1.x86_64",
"openSUSE Leap 15.1:go1.13-doc-1.13.15-lp151.8.1.x86_64",
"openSUSE Leap 15.1:go1.13-race-1.13.15-lp151.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:go1.13-1.13.15-lp151.8.1.x86_64",
"openSUSE Leap 15.1:go1.13-doc-1.13.15-lp151.8.1.x86_64",
"openSUSE Leap 15.1:go1.13-race-1.13.15-lp151.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-10T18:20:07Z",
"details": "moderate"
}
],
"title": "CVE-2020-16845"
}
]
}
opensuse-su-2020:1194-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.13",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.13 fixes the following issues:\n\n- go1.13 was updated to version 1.13.5 \n- CVE-2020-16845: dUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (bsc#1174977).\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-1194",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1194-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:1194-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZQ73K4ZFTLIPSDCYRJXTRBAIY7W3SXLD/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:1194-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZQ73K4ZFTLIPSDCYRJXTRBAIY7W3SXLD/"
},
{
"category": "self",
"summary": "SUSE Bug 1149259",
"url": "https://bugzilla.suse.com/1149259"
},
{
"category": "self",
"summary": "SUSE Bug 1174977",
"url": "https://bugzilla.suse.com/1174977"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16845 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16845/"
}
],
"title": "Security update for go1.13",
"tracking": {
"current_release_date": "2020-08-12T12:23:01Z",
"generator": {
"date": "2020-08-12T12:23:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:1194-1",
"initial_release_date": "2020-08-12T12:23:01Z",
"revision_history": [
{
"date": "2020-08-12T12:23:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.13-1.13.15-lp152.2.7.1.x86_64",
"product": {
"name": "go1.13-1.13.15-lp152.2.7.1.x86_64",
"product_id": "go1.13-1.13.15-lp152.2.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.13-doc-1.13.15-lp152.2.7.1.x86_64",
"product": {
"name": "go1.13-doc-1.13.15-lp152.2.7.1.x86_64",
"product_id": "go1.13-doc-1.13.15-lp152.2.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.13-race-1.13.15-lp152.2.7.1.x86_64",
"product": {
"name": "go1.13-race-1.13.15-lp152.2.7.1.x86_64",
"product_id": "go1.13-race-1.13.15-lp152.2.7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-1.13.15-lp152.2.7.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:go1.13-1.13.15-lp152.2.7.1.x86_64"
},
"product_reference": "go1.13-1.13.15-lp152.2.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-doc-1.13.15-lp152.2.7.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:go1.13-doc-1.13.15-lp152.2.7.1.x86_64"
},
"product_reference": "go1.13-doc-1.13.15-lp152.2.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.13-race-1.13.15-lp152.2.7.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:go1.13-race-1.13.15-lp152.2.7.1.x86_64"
},
"product_reference": "go1.13-race-1.13.15-lp152.2.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-16845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16845"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:go1.13-1.13.15-lp152.2.7.1.x86_64",
"openSUSE Leap 15.2:go1.13-doc-1.13.15-lp152.2.7.1.x86_64",
"openSUSE Leap 15.2:go1.13-race-1.13.15-lp152.2.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16845",
"url": "https://www.suse.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "SUSE Bug 1174977 for CVE-2020-16845",
"url": "https://bugzilla.suse.com/1174977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:go1.13-1.13.15-lp152.2.7.1.x86_64",
"openSUSE Leap 15.2:go1.13-doc-1.13.15-lp152.2.7.1.x86_64",
"openSUSE Leap 15.2:go1.13-race-1.13.15-lp152.2.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:go1.13-1.13.15-lp152.2.7.1.x86_64",
"openSUSE Leap 15.2:go1.13-doc-1.13.15-lp152.2.7.1.x86_64",
"openSUSE Leap 15.2:go1.13-race-1.13.15-lp152.2.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-12T12:23:01Z",
"details": "moderate"
}
],
"title": "CVE-2020-16845"
}
]
}
opensuse-su-2020:1405-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.14",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.14 fixes the following issues:\n\n- go1.14 was updated to version 1.14.7 \n- CVE-2020-16845: dUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (bsc#1174977).\t \n\n- go1.14.6 (released 2020-07-16) includes fixes to the go command,\n the compiler, the linker, vet, and the database/sql,\n encoding/json, net/http, reflect, and testing packages.\n Refs bsc#1164903 go1.14 release tracking\n Refs bsc#1174153 bsc#1174191\n * go#39991 runtime: missing deferreturn on linux/ppc64le\n * go#39920 net/http: panic on misformed If-None-Match Header with http.ServeContent\n * go#39849 cmd/compile: internal compile error when using sync.Pool: mismatched zero/store sizes\n * go#39824 cmd/go: TestBuildIDContainsArchModeEnv/386 fails on linux/386 in Go 1.14 and 1.13, not 1.15\n * go#39698 reflect: panic from malloc after MakeFunc function returns value that is also stored globally\n * go#39636 reflect: DeepEqual can return true for values that are not equal\n * go#39585 encoding/json: incorrect object key unmarshaling when using custom TextUnmarshaler as Key with string va\nlues\n * go#39562 cmd/compile/internal/ssa: TestNexting/dlv-dbg-hist failing on linux-386-longtest builder because it trie\ns to use an older version of dlv which only supports linux/amd64\n * go#39308 testing: streaming output loses parallel subtest associations\n * go#39288 cmd/vet: update for new number formats\n * go#39101 database/sql: context cancellation allows statements to execute after rollback\n * go#38030 doc: BuildNameToCertificate deprecated in go 1.14 not mentioned in the release notes\n * go#40212 net/http: Expect 100-continue panics in httputil.ReverseProxy bsc#1174153 CVE-2020-15586\n * go#40210 crypto/x509: Certificate.Verify method seemingly ignoring EKU requirements on Windows bsc#1174191 CVE-2020-14039 (Windows only)\n- Add patch to ensure /etc/hosts is used if /etc/nsswitch.conf is\n not present bsc#1172868 gh#golang/go#35305\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-1405",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1405-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:1405-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DMSI6TFFNOIMEI3XSXGHKMVCWZP2743Q/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:1405-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DMSI6TFFNOIMEI3XSXGHKMVCWZP2743Q/"
},
{
"category": "self",
"summary": "SUSE Bug 1164903",
"url": "https://bugzilla.suse.com/1164903"
},
{
"category": "self",
"summary": "SUSE Bug 1169832",
"url": "https://bugzilla.suse.com/1169832"
},
{
"category": "self",
"summary": "SUSE Bug 1170826",
"url": "https://bugzilla.suse.com/1170826"
},
{
"category": "self",
"summary": "SUSE Bug 1172868",
"url": "https://bugzilla.suse.com/1172868"
},
{
"category": "self",
"summary": "SUSE Bug 1174153",
"url": "https://bugzilla.suse.com/1174153"
},
{
"category": "self",
"summary": "SUSE Bug 1174191",
"url": "https://bugzilla.suse.com/1174191"
},
{
"category": "self",
"summary": "SUSE Bug 1174977",
"url": "https://bugzilla.suse.com/1174977"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14039 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16845 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16845/"
}
],
"title": "Security update for go1.14",
"tracking": {
"current_release_date": "2020-09-10T18:24:01Z",
"generator": {
"date": "2020-09-10T18:24:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:1405-1",
"initial_release_date": "2020-09-10T18:24:01Z",
"revision_history": [
{
"date": "2020-09-10T18:24:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.7-lp151.13.1.x86_64",
"product": {
"name": "go1.14-1.14.7-lp151.13.1.x86_64",
"product_id": "go1.14-1.14.7-lp151.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.7-lp151.13.1.x86_64",
"product": {
"name": "go1.14-doc-1.14.7-lp151.13.1.x86_64",
"product_id": "go1.14-doc-1.14.7-lp151.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.14-race-1.14.7-lp151.13.1.x86_64",
"product": {
"name": "go1.14-race-1.14.7-lp151.13.1.x86_64",
"product_id": "go1.14-race-1.14.7-lp151.13.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.7-lp151.13.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:go1.14-1.14.7-lp151.13.1.x86_64"
},
"product_reference": "go1.14-1.14.7-lp151.13.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.7-lp151.13.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:go1.14-doc-1.14.7-lp151.13.1.x86_64"
},
"product_reference": "go1.14-doc-1.14.7-lp151.13.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-race-1.14.7-lp151.13.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:go1.14-race-1.14.7-lp151.13.1.x86_64"
},
"product_reference": "go1.14-race-1.14.7-lp151.13.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14039"
}
],
"notes": [
{
"category": "general",
"text": "In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:go1.14-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.7-lp151.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14039",
"url": "https://www.suse.com/security/cve/CVE-2020-14039"
},
{
"category": "external",
"summary": "SUSE Bug 1174191 for CVE-2020-14039",
"url": "https://bugzilla.suse.com/1174191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:go1.14-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.7-lp151.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:go1.14-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.7-lp151.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-10T18:24:01Z",
"details": "moderate"
}
],
"title": "CVE-2020-14039"
},
{
"cve": "CVE-2020-15586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15586"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:go1.14-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.7-lp151.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15586",
"url": "https://www.suse.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "SUSE Bug 1174153 for CVE-2020-15586",
"url": "https://bugzilla.suse.com/1174153"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:go1.14-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.7-lp151.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:go1.14-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.7-lp151.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-10T18:24:01Z",
"details": "important"
}
],
"title": "CVE-2020-15586"
},
{
"cve": "CVE-2020-16845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16845"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:go1.14-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.7-lp151.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16845",
"url": "https://www.suse.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "SUSE Bug 1174977 for CVE-2020-16845",
"url": "https://bugzilla.suse.com/1174977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:go1.14-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.7-lp151.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:go1.14-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.7-lp151.13.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.7-lp151.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-10T18:24:01Z",
"details": "moderate"
}
],
"title": "CVE-2020-16845"
}
]
}
opensuse-su-2024:10807-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.14-1.14.15-1.6 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.14-1.14.15-1.6 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10807",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10807-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14039 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16845 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24553 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24553/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28362 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28366 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28367 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28367/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3114 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3114/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3115 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3115/"
}
],
"title": "go1.14-1.14.15-1.6 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10807-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.15-1.6.aarch64",
"product": {
"name": "go1.14-1.14.15-1.6.aarch64",
"product_id": "go1.14-1.14.15-1.6.aarch64"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.15-1.6.aarch64",
"product": {
"name": "go1.14-doc-1.14.15-1.6.aarch64",
"product_id": "go1.14-doc-1.14.15-1.6.aarch64"
}
},
{
"category": "product_version",
"name": "go1.14-race-1.14.15-1.6.aarch64",
"product": {
"name": "go1.14-race-1.14.15-1.6.aarch64",
"product_id": "go1.14-race-1.14.15-1.6.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.15-1.6.ppc64le",
"product": {
"name": "go1.14-1.14.15-1.6.ppc64le",
"product_id": "go1.14-1.14.15-1.6.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.15-1.6.ppc64le",
"product": {
"name": "go1.14-doc-1.14.15-1.6.ppc64le",
"product_id": "go1.14-doc-1.14.15-1.6.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.14-race-1.14.15-1.6.ppc64le",
"product": {
"name": "go1.14-race-1.14.15-1.6.ppc64le",
"product_id": "go1.14-race-1.14.15-1.6.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.15-1.6.s390x",
"product": {
"name": "go1.14-1.14.15-1.6.s390x",
"product_id": "go1.14-1.14.15-1.6.s390x"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.15-1.6.s390x",
"product": {
"name": "go1.14-doc-1.14.15-1.6.s390x",
"product_id": "go1.14-doc-1.14.15-1.6.s390x"
}
},
{
"category": "product_version",
"name": "go1.14-race-1.14.15-1.6.s390x",
"product": {
"name": "go1.14-race-1.14.15-1.6.s390x",
"product_id": "go1.14-race-1.14.15-1.6.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.15-1.6.x86_64",
"product": {
"name": "go1.14-1.14.15-1.6.x86_64",
"product_id": "go1.14-1.14.15-1.6.x86_64"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.15-1.6.x86_64",
"product": {
"name": "go1.14-doc-1.14.15-1.6.x86_64",
"product_id": "go1.14-doc-1.14.15-1.6.x86_64"
}
},
{
"category": "product_version",
"name": "go1.14-race-1.14.15-1.6.x86_64",
"product": {
"name": "go1.14-race-1.14.15-1.6.x86_64",
"product_id": "go1.14-race-1.14.15-1.6.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.15-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64"
},
"product_reference": "go1.14-1.14.15-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.15-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le"
},
"product_reference": "go1.14-1.14.15-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.15-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x"
},
"product_reference": "go1.14-1.14.15-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.15-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64"
},
"product_reference": "go1.14-1.14.15-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.15-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64"
},
"product_reference": "go1.14-doc-1.14.15-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.15-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le"
},
"product_reference": "go1.14-doc-1.14.15-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.15-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x"
},
"product_reference": "go1.14-doc-1.14.15-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.15-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64"
},
"product_reference": "go1.14-doc-1.14.15-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-race-1.14.15-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64"
},
"product_reference": "go1.14-race-1.14.15-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-race-1.14.15-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le"
},
"product_reference": "go1.14-race-1.14.15-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-race-1.14.15-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x"
},
"product_reference": "go1.14-race-1.14.15-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-race-1.14.15-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
},
"product_reference": "go1.14-race-1.14.15-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14039"
}
],
"notes": [
{
"category": "general",
"text": "In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14039",
"url": "https://www.suse.com/security/cve/CVE-2020-14039"
},
{
"category": "external",
"summary": "SUSE Bug 1174191 for CVE-2020-14039",
"url": "https://bugzilla.suse.com/1174191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14039"
},
{
"cve": "CVE-2020-15586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15586"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15586",
"url": "https://www.suse.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "SUSE Bug 1174153 for CVE-2020-15586",
"url": "https://bugzilla.suse.com/1174153"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-15586"
},
{
"cve": "CVE-2020-16845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16845"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16845",
"url": "https://www.suse.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "SUSE Bug 1174977 for CVE-2020-16845",
"url": "https://bugzilla.suse.com/1174977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16845"
},
{
"cve": "CVE-2020-24553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24553"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.14.8 and 1.15.x before 1.15.1 allows XSS because text/html is the default for CGI/FCGI handlers that lack a Content-Type header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24553",
"url": "https://www.suse.com/security/cve/CVE-2020-24553"
},
{
"category": "external",
"summary": "SUSE Bug 1176031 for CVE-2020-24553",
"url": "https://bugzilla.suse.com/1176031"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24553"
},
{
"cve": "CVE-2020-28362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28362"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28362",
"url": "https://www.suse.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "SUSE Bug 1178750 for CVE-2020-28362",
"url": "https://bugzilla.suse.com/1178750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-28362"
},
{
"cve": "CVE-2020-28366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28366"
}
],
"notes": [
{
"category": "general",
"text": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28366",
"url": "https://www.suse.com/security/cve/CVE-2020-28366"
},
{
"category": "external",
"summary": "SUSE Bug 1178753 for CVE-2020-28366",
"url": "https://bugzilla.suse.com/1178753"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-28366"
},
{
"cve": "CVE-2020-28367",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28367"
}
],
"notes": [
{
"category": "general",
"text": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28367",
"url": "https://www.suse.com/security/cve/CVE-2020-28367"
},
{
"category": "external",
"summary": "SUSE Bug 1178752 for CVE-2020-28367",
"url": "https://bugzilla.suse.com/1178752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-28367"
},
{
"cve": "CVE-2021-3114",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3114"
}
],
"notes": [
{
"category": "general",
"text": "In Go before 1.14.14 and 1.15.x before 1.15.7, crypto/elliptic/p224.go can generate incorrect outputs, related to an underflow of the lowest limb during the final complete reduction in the P-224 field.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3114",
"url": "https://www.suse.com/security/cve/CVE-2021-3114"
},
{
"category": "external",
"summary": "SUSE Bug 1181145 for CVE-2021-3114",
"url": "https://bugzilla.suse.com/1181145"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3114"
},
{
"cve": "CVE-2021-3115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3115"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the \"go get\" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3115",
"url": "https://www.suse.com/security/cve/CVE-2021-3115"
},
{
"category": "external",
"summary": "SUSE Bug 1181146 for CVE-2021-3115",
"url": "https://bugzilla.suse.com/1181146"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3115"
}
]
}
suse-su-2020:2562-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.14",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.14 fixes the following issues:\n\n- go1.14 was updated to version 1.14.7 \n- CVE-2020-16845: dUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (bsc#1174977).\t \n\n- go1.14.6 (released 2020-07-16) includes fixes to the go command,\n the compiler, the linker, vet, and the database/sql,\n encoding/json, net/http, reflect, and testing packages.\n Refs bsc#1164903 go1.14 release tracking\n Refs bsc#1174153 bsc#1174191\n * go#39991 runtime: missing deferreturn on linux/ppc64le\n * go#39920 net/http: panic on misformed If-None-Match Header with http.ServeContent\n * go#39849 cmd/compile: internal compile error when using sync.Pool: mismatched zero/store sizes\n * go#39824 cmd/go: TestBuildIDContainsArchModeEnv/386 fails on linux/386 in Go 1.14 and 1.13, not 1.15\n * go#39698 reflect: panic from malloc after MakeFunc function returns value that is also stored globally\n * go#39636 reflect: DeepEqual can return true for values that are not equal\n * go#39585 encoding/json: incorrect object key unmarshaling when using custom TextUnmarshaler as Key with string va\nlues\n * go#39562 cmd/compile/internal/ssa: TestNexting/dlv-dbg-hist failing on linux-386-longtest builder because it trie\ns to use an older version of dlv which only supports linux/amd64\n * go#39308 testing: streaming output loses parallel subtest associations\n * go#39288 cmd/vet: update for new number formats\n * go#39101 database/sql: context cancellation allows statements to execute after rollback\n * go#38030 doc: BuildNameToCertificate deprecated in go 1.14 not mentioned in the release notes\n * go#40212 net/http: Expect 100-continue panics in httputil.ReverseProxy bsc#1174153 CVE-2020-15586\n * go#40210 crypto/x509: Certificate.Verify method seemingly ignoring EKU requirements on Windows bsc#1174191 CVE-2020-14039 (Windows only)\n- Add patch to ensure /etc/hosts is used if /etc/nsswitch.conf is\n not present bsc#1172868 gh#golang/go#35305\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2020-2562,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2562,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2562",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2562-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:2562-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202562-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:2562-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007377.html"
},
{
"category": "self",
"summary": "SUSE Bug 1164903",
"url": "https://bugzilla.suse.com/1164903"
},
{
"category": "self",
"summary": "SUSE Bug 1169832",
"url": "https://bugzilla.suse.com/1169832"
},
{
"category": "self",
"summary": "SUSE Bug 1170826",
"url": "https://bugzilla.suse.com/1170826"
},
{
"category": "self",
"summary": "SUSE Bug 1172868",
"url": "https://bugzilla.suse.com/1172868"
},
{
"category": "self",
"summary": "SUSE Bug 1174153",
"url": "https://bugzilla.suse.com/1174153"
},
{
"category": "self",
"summary": "SUSE Bug 1174191",
"url": "https://bugzilla.suse.com/1174191"
},
{
"category": "self",
"summary": "SUSE Bug 1174977",
"url": "https://bugzilla.suse.com/1174977"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14039 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16845 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16845/"
}
],
"title": "Security update for go1.14",
"tracking": {
"current_release_date": "2020-09-07T15:10:08Z",
"generator": {
"date": "2020-09-07T15:10:08Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:2562-1",
"initial_release_date": "2020-09-07T15:10:08Z",
"revision_history": [
{
"date": "2020-09-07T15:10:08Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.7-1.15.1.aarch64",
"product": {
"name": "go1.14-1.14.7-1.15.1.aarch64",
"product_id": "go1.14-1.14.7-1.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.7-1.15.1.aarch64",
"product": {
"name": "go1.14-doc-1.14.7-1.15.1.aarch64",
"product_id": "go1.14-doc-1.14.7-1.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.14-race-1.14.7-1.15.1.aarch64",
"product": {
"name": "go1.14-race-1.14.7-1.15.1.aarch64",
"product_id": "go1.14-race-1.14.7-1.15.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.7-1.15.1.i586",
"product": {
"name": "go1.14-1.14.7-1.15.1.i586",
"product_id": "go1.14-1.14.7-1.15.1.i586"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.7-1.15.1.i586",
"product": {
"name": "go1.14-doc-1.14.7-1.15.1.i586",
"product_id": "go1.14-doc-1.14.7-1.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.7-1.15.1.ppc64le",
"product": {
"name": "go1.14-1.14.7-1.15.1.ppc64le",
"product_id": "go1.14-1.14.7-1.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.7-1.15.1.ppc64le",
"product": {
"name": "go1.14-doc-1.14.7-1.15.1.ppc64le",
"product_id": "go1.14-doc-1.14.7-1.15.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.7-1.15.1.s390x",
"product": {
"name": "go1.14-1.14.7-1.15.1.s390x",
"product_id": "go1.14-1.14.7-1.15.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.7-1.15.1.s390x",
"product": {
"name": "go1.14-doc-1.14.7-1.15.1.s390x",
"product_id": "go1.14-doc-1.14.7-1.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.7-1.15.1.x86_64",
"product": {
"name": "go1.14-1.14.7-1.15.1.x86_64",
"product_id": "go1.14-1.14.7-1.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.7-1.15.1.x86_64",
"product": {
"name": "go1.14-doc-1.14.7-1.15.1.x86_64",
"product_id": "go1.14-doc-1.14.7-1.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.14-race-1.14.7-1.15.1.x86_64",
"product": {
"name": "go1.14-race-1.14.7-1.15.1.x86_64",
"product_id": "go1.14-race-1.14.7-1.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.7-1.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.aarch64"
},
"product_reference": "go1.14-1.14.7-1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.7-1.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.ppc64le"
},
"product_reference": "go1.14-1.14.7-1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.7-1.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.s390x"
},
"product_reference": "go1.14-1.14.7-1.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.7-1.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.x86_64"
},
"product_reference": "go1.14-1.14.7-1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.7-1.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.aarch64"
},
"product_reference": "go1.14-doc-1.14.7-1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.7-1.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.ppc64le"
},
"product_reference": "go1.14-doc-1.14.7-1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.7-1.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.s390x"
},
"product_reference": "go1.14-doc-1.14.7-1.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.7-1.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.x86_64"
},
"product_reference": "go1.14-doc-1.14.7-1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.7-1.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.aarch64"
},
"product_reference": "go1.14-1.14.7-1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.7-1.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.ppc64le"
},
"product_reference": "go1.14-1.14.7-1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.7-1.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.s390x"
},
"product_reference": "go1.14-1.14.7-1.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.7-1.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.x86_64"
},
"product_reference": "go1.14-1.14.7-1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.7-1.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.aarch64"
},
"product_reference": "go1.14-doc-1.14.7-1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.7-1.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.ppc64le"
},
"product_reference": "go1.14-doc-1.14.7-1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.7-1.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.s390x"
},
"product_reference": "go1.14-doc-1.14.7-1.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.7-1.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.x86_64"
},
"product_reference": "go1.14-doc-1.14.7-1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14039"
}
],
"notes": [
{
"category": "general",
"text": "In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14039",
"url": "https://www.suse.com/security/cve/CVE-2020-14039"
},
{
"category": "external",
"summary": "SUSE Bug 1174191 for CVE-2020-14039",
"url": "https://bugzilla.suse.com/1174191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-07T15:10:08Z",
"details": "moderate"
}
],
"title": "CVE-2020-14039"
},
{
"cve": "CVE-2020-15586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15586"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15586",
"url": "https://www.suse.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "SUSE Bug 1174153 for CVE-2020-15586",
"url": "https://bugzilla.suse.com/1174153"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-07T15:10:08Z",
"details": "important"
}
],
"title": "CVE-2020-15586"
},
{
"cve": "CVE-2020-16845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16845"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16845",
"url": "https://www.suse.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "SUSE Bug 1174977 for CVE-2020-16845",
"url": "https://bugzilla.suse.com/1174977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:go1.14-doc-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-1.14.7-1.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.14-doc-1.14.7-1.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-07T15:10:08Z",
"details": "moderate"
}
],
"title": "CVE-2020-16845"
}
]
}
cnvd-2020-46848
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
| Name | ['Google GO < 1.13.15', 'Google GO 14.*,<1.14.7'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-16845",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845"
}
},
"description": "Google Go\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u9759\u6001\u5f3a\u7c7b\u578b\u3001\u7f16\u8bd1\u578b\u3001\u5e76\u53d1\u578b\uff0c\u5e76\u5177\u6709\u5783\u573e\u56de\u6536\u529f\u80fd\u7684\u7f16\u7a0b\u8bed\u8a00\u3002\n\nGoogle Go 1.13.15\u4e4b\u524d\u7248\u672c\u548c1.14.7\u4e4b\u524d\u768414.x\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u65e0\u6548\u7684\u8f93\u5165\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u65e0\u9650\u8bfb\u53d6\u5faa\u73af\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-46848",
"openTime": "2020-08-19",
"patchDescription": "Google Go\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u9759\u6001\u5f3a\u7c7b\u578b\u3001\u7f16\u8bd1\u578b\u3001\u5e76\u53d1\u578b\uff0c\u5e76\u5177\u6709\u5783\u573e\u56de\u6536\u529f\u80fd\u7684\u7f16\u7a0b\u8bed\u8a00\u3002\r\n\r\nGoogle Go 1.13.15\u4e4b\u524d\u7248\u672c\u548c1.14.7\u4e4b\u524d\u768414.x\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u65e0\u6548\u7684\u8f93\u5165\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u65e0\u9650\u8bfb\u53d6\u5faa\u73af\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Google Go\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2020-46848\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Google GO \u003c 1.13.15",
"Google GO 14.*\uff0c\u003c1.14.7"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"serverity": "\u4e2d",
"submitTime": "2020-08-10",
"title": "Google Go\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2020-46848\uff09"
}
wid-sec-w-2023-1599
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM Security Guardium ist eine L\u00f6sung f\u00fcr die \u00dcberwachung und Auditierung des Datenzugriffs.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Security Guardium ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1599 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2023-1599.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1599 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1599"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7008449 vom 2023-06-29",
"url": "https://www.ibm.com/support/pages/node/7008449"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6403463 vom 2021-01-13",
"url": "https://www.ibm.com/support/pages/node/6403463"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:0521 vom 2021-02-15",
"url": "https://access.redhat.com/errata/RHSA-2021:0521"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:0548 vom 2021-02-16",
"url": "https://access.redhat.com/errata/RHSA-2021:0548"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4758-1 vom 2021-03-09",
"url": "https://ubuntu.com/security/notices/USN-4758-1"
}
],
"source_lang": "en-US",
"title": "IBM Security Guardium: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-06-29T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:53:55.140+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1599",
"initial_release_date": "2021-01-13T23:00:00.000+00:00",
"revision_history": [
{
"date": "2021-01-13T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-02-15T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-02-16T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-03-08T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-06-29T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM DB2",
"product": {
"name": "IBM DB2",
"product_id": "5104",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:-"
}
}
},
{
"category": "product_name",
"name": "IBM Security Guardium Insights 2.0.2",
"product": {
"name": "IBM Security Guardium Insights 2.0.2",
"product_id": "316562",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:10.0"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14039",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-14039"
},
{
"cve": "CVE-2020-14145",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-14145"
},
{
"cve": "CVE-2020-15168",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-15168"
},
{
"cve": "CVE-2020-15586",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-15586"
},
{
"cve": "CVE-2020-15778",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-15778"
},
{
"cve": "CVE-2020-16845",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-16845"
},
{
"cve": "CVE-2020-24553",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-24553"
},
{
"cve": "CVE-2020-4166",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4166"
},
{
"cve": "CVE-2020-4594",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4594"
},
{
"cve": "CVE-2020-4595",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4595"
},
{
"cve": "CVE-2020-4596",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4596"
},
{
"cve": "CVE-2020-4597",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4597"
},
{
"cve": "CVE-2020-4599",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4599"
},
{
"cve": "CVE-2020-4600",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4600"
},
{
"cve": "CVE-2020-4602",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4602"
},
{
"cve": "CVE-2020-4604",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4604"
},
{
"cve": "CVE-2020-7608",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-7608"
},
{
"cve": "CVE-2020-8244",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-8244"
}
]
}
WID-SEC-W-2023-1599
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM Security Guardium ist eine L\u00f6sung f\u00fcr die \u00dcberwachung und Auditierung des Datenzugriffs.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Security Guardium ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1599 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2023-1599.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1599 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1599"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7008449 vom 2023-06-29",
"url": "https://www.ibm.com/support/pages/node/7008449"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6403463 vom 2021-01-13",
"url": "https://www.ibm.com/support/pages/node/6403463"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:0521 vom 2021-02-15",
"url": "https://access.redhat.com/errata/RHSA-2021:0521"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:0548 vom 2021-02-16",
"url": "https://access.redhat.com/errata/RHSA-2021:0548"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4758-1 vom 2021-03-09",
"url": "https://ubuntu.com/security/notices/USN-4758-1"
}
],
"source_lang": "en-US",
"title": "IBM Security Guardium: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-06-29T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:53:55.140+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1599",
"initial_release_date": "2021-01-13T23:00:00.000+00:00",
"revision_history": [
{
"date": "2021-01-13T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-02-15T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-02-16T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-03-08T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-06-29T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM DB2",
"product": {
"name": "IBM DB2",
"product_id": "5104",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:-"
}
}
},
{
"category": "product_name",
"name": "IBM Security Guardium Insights 2.0.2",
"product": {
"name": "IBM Security Guardium Insights 2.0.2",
"product_id": "316562",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:10.0"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14039",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-14039"
},
{
"cve": "CVE-2020-14145",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-14145"
},
{
"cve": "CVE-2020-15168",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-15168"
},
{
"cve": "CVE-2020-15586",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-15586"
},
{
"cve": "CVE-2020-15778",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-15778"
},
{
"cve": "CVE-2020-16845",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-16845"
},
{
"cve": "CVE-2020-24553",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-24553"
},
{
"cve": "CVE-2020-4166",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4166"
},
{
"cve": "CVE-2020-4594",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4594"
},
{
"cve": "CVE-2020-4595",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4595"
},
{
"cve": "CVE-2020-4596",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4596"
},
{
"cve": "CVE-2020-4597",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4597"
},
{
"cve": "CVE-2020-4599",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4599"
},
{
"cve": "CVE-2020-4600",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4600"
},
{
"cve": "CVE-2020-4602",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4602"
},
{
"cve": "CVE-2020-4604",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-4604"
},
{
"cve": "CVE-2020-7608",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-7608"
},
{
"cve": "CVE-2020-8244",
"notes": [
{
"category": "description",
"text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T000126",
"5104",
"316562"
]
},
"release_date": "2021-01-13T23:00:00.000+00:00",
"title": "CVE-2020-8244"
}
]
}
fkie_cve-2020-16845
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo | ||
| cve@mitre.org | https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q | ||
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/ | ||
| cve@mitre.org | https://security.netapp.com/advisory/ntap-20200924-0002/ | Third Party Advisory | |
| cve@mitre.org | https://www.debian.org/security/2021/dsa-4848 | Third Party Advisory | |
| cve@mitre.org | https://www.oracle.com/security-alerts/cpuApr2021.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20200924-0002/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4848 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuApr2021.html | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| golang | go | * | |
| golang | go | * | |
| opensuse | leap | 15.1 | |
| opensuse | leap | 15.2 | |
| debian | debian_linux | 9.0 | |
| debian | debian_linux | 10.0 | |
| fedoraproject | fedora | 31 | |
| fedoraproject | fedora | 32 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F4422E-27A3-474D-A4AF-0BEE8AD7293C",
"versionEndExcluding": "1.13.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A59FA2E-0F06-4EDF-9E8C-32D6F656EB54",
"versionEndExcluding": "1.14.7",
"versionStartIncluding": "1.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs."
},
{
"lang": "es",
"value": "Go versiones anteriores a 1.13.15 y versiones 14.x anteriores a 1.14.7, puede presentar un bucle de lectura infinito en las funciones ReadUvarint y ReadVarint en encoding/binary por medio de entradas no v\u00e1lidas"
}
],
"id": "CVE-2020-16845",
"lastModified": "2024-11-21T05:07:15.297",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-08-06T18:15:13.700",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html"
},
{
"source": "cve@mitre.org",
"url": "https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo"
},
{
"source": "cve@mitre.org",
"url": "https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20200924-0002/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4848"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20200924-0002/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4848"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-835"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2020-16845
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2020-16845",
"description": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.",
"id": "GSD-2020-16845",
"references": [
"https://www.suse.com/security/cve/CVE-2020-16845.html",
"https://www.debian.org/security/2021/dsa-4848",
"https://access.redhat.com/errata/RHSA-2021:4103",
"https://access.redhat.com/errata/RHSA-2021:2122",
"https://access.redhat.com/errata/RHSA-2021:1515",
"https://access.redhat.com/errata/RHSA-2021:1366",
"https://access.redhat.com/errata/RHSA-2021:1016",
"https://access.redhat.com/errata/RHSA-2021:0956",
"https://access.redhat.com/errata/RHSA-2021:0799",
"https://access.redhat.com/errata/RHSA-2021:0713",
"https://access.redhat.com/errata/RHSA-2021:0172",
"https://access.redhat.com/errata/RHBA-2021:0101",
"https://access.redhat.com/errata/RHBA-2021:0075",
"https://access.redhat.com/errata/RHSA-2021:0072",
"https://access.redhat.com/errata/RHSA-2020:5649",
"https://access.redhat.com/errata/RHSA-2020:5606",
"https://access.redhat.com/errata/RHSA-2020:5605",
"https://access.redhat.com/errata/RHBA-2020:5356",
"https://access.redhat.com/errata/RHSA-2020:5159",
"https://access.redhat.com/errata/RHBA-2020:5123",
"https://access.redhat.com/errata/RHSA-2020:5119",
"https://access.redhat.com/errata/RHSA-2020:5118",
"https://access.redhat.com/errata/RHSA-2020:4297",
"https://access.redhat.com/errata/RHBA-2020:4229",
"https://access.redhat.com/errata/RHSA-2020:4214",
"https://access.redhat.com/errata/RHSA-2020:4201",
"https://access.redhat.com/errata/RHBA-2020:4197",
"https://access.redhat.com/errata/RHBA-2020:4139",
"https://access.redhat.com/errata/RHSA-2020:3665",
"https://advisories.mageia.org/CVE-2020-16845.html",
"https://alas.aws.amazon.com/cve/html/CVE-2020-16845.html",
"https://linux.oracle.com/cve/CVE-2020-16845.html",
"https://ubuntu.com/security/CVE-2020-16845"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-16845"
],
"details": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.",
"id": "GSD-2020-16845",
"modified": "2023-12-13T01:21:46.668102Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-16845",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q",
"refsource": "MISC",
"url": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q"
},
{
"name": "openSUSE-SU-2020:1178",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html"
},
{
"name": "openSUSE-SU-2020:1194",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html"
},
{
"name": "FEDORA-2020-e384830a0d",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/"
},
{
"name": "FEDORA-2020-deff052e7a",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/"
},
{
"name": "FEDORA-2020-a55f130272",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/"
},
{
"name": "FEDORA-2020-b190375a37",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/"
},
{
"name": "openSUSE-SU-2020:1405",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html"
},
{
"name": "openSUSE-SU-2020:1407",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html"
},
{
"name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2459-1] golang-1.7 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html"
},
{
"name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2460-1] golang-1.8 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html"
},
{
"name": "DSA-4848",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-4848"
},
{
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"name": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo"
},
{
"name": "https://security.netapp.com/advisory/ntap-20200924-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20200924-0002/"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c0.5.8",
"affected_versions": "All versions before 0.5.8",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-707",
"CWE-835",
"CWE-937"
],
"date": "2021-12-16",
"description": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.",
"fixed_versions": [
"0.5.8"
],
"identifier": "CVE-2020-16845",
"identifiers": [
"GHSA-q6gq-997w-f55g",
"CVE-2020-16845"
],
"not_impacted": "All versions starting from 0.5.8",
"package_slug": "go/github.com/ulikunitz/xz",
"pubdate": "2021-12-16",
"solution": "Upgrade to version 0.5.8 or above.",
"title": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-16845",
"https://github.com/ulikunitz/xz/issues/35",
"https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b",
"https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo",
"https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q",
"https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html",
"https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/",
"https://security.netapp.com/advisory/ntap-20200924-0002/",
"https://www.debian.org/security/2021/dsa-4848",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html",
"https://github.com/advisories/GHSA-q6gq-997w-f55g"
],
"uuid": "a68aacc5-c6e7-4b47-a22f-57d7bf52a89c"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.14.7",
"versionStartIncluding": "1.14",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.13.15",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-16845"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q"
},
{
"name": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo"
},
{
"name": "openSUSE-SU-2020:1178",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html"
},
{
"name": "openSUSE-SU-2020:1194",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html"
},
{
"name": "FEDORA-2020-deff052e7a",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/"
},
{
"name": "FEDORA-2020-e384830a0d",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/"
},
{
"name": "FEDORA-2020-a55f130272",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/"
},
{
"name": "FEDORA-2020-b190375a37",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/"
},
{
"name": "openSUSE-SU-2020:1405",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html"
},
{
"name": "openSUSE-SU-2020:1407",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20200924-0002/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20200924-0002/"
},
{
"name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2459-1] golang-1.7 security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html"
},
{
"name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2460-1] golang-1.8 security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html"
},
{
"name": "DSA-4848",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4848"
},
{
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-02-03T02:28Z",
"publishedDate": "2020-08-06T18:15Z"
}
}
}
msrc_cve-2020-16845
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2020-16845 Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2020/msrc_cve-2020-16845.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.",
"tracking": {
"current_release_date": "2024-09-11T00:00:00.000Z",
"generator": {
"date": "2025-10-19T18:03:13.173Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2020-16845",
"initial_release_date": "2020-08-02T00:00:00.000Z",
"revision_history": [
{
"date": "2020-08-18T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-08-29T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
},
{
"date": "2024-08-30T00:00:00.000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Information published."
},
{
"date": "2024-08-31T00:00:00.000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Information published."
},
{
"date": "2024-09-01T00:00:00.000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Information published."
},
{
"date": "2024-09-02T00:00:00.000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Information published."
},
{
"date": "2024-09-03T00:00:00.000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Information published."
},
{
"date": "2024-09-05T00:00:00.000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Information published."
},
{
"date": "2024-09-06T00:00:00.000Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Information published."
},
{
"date": "2024-09-07T00:00:00.000Z",
"legacy_version": "1.9",
"number": "10",
"summary": "Information published."
},
{
"date": "2024-09-08T00:00:00.000Z",
"legacy_version": "2",
"number": "11",
"summary": "Information published."
},
{
"date": "2024-09-11T00:00:00.000Z",
"legacy_version": "2.1",
"number": "12",
"summary": "Information published."
}
],
"status": "final",
"version": "12"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 golang 1.15.13-1",
"product": {
"name": "\u003ccm1 golang 1.15.13-1",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "cm1 golang 1.15.13-1",
"product": {
"name": "cm1 golang 1.15.13-1",
"product_id": "19049"
}
}
],
"category": "product_name",
"name": "golang"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 python-tensorboard 2.16.2-2",
"product": {
"name": "\u003cazl3 python-tensorboard 2.16.2-2",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "azl3 python-tensorboard 2.16.2-2",
"product": {
"name": "azl3 python-tensorboard 2.16.2-2",
"product_id": "17021"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 python-tensorboard 2.11.0-3",
"product": {
"name": "\u003cazl3 python-tensorboard 2.11.0-3",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 python-tensorboard 2.11.0-3",
"product": {
"name": "azl3 python-tensorboard 2.11.0-3",
"product_id": "19696"
}
}
],
"category": "product_name",
"name": "python-tensorboard"
},
{
"category": "product_name",
"name": "azl3 golang 1.23.9-1",
"product": {
"name": "azl3 golang 1.23.9-1",
"product_id": "3"
}
},
{
"category": "product_name",
"name": "azl3 golang 1.24.3-1",
"product": {
"name": "azl3 golang 1.24.3-1",
"product_id": "1"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.23.9-1 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.24.3-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 golang 1.15.13-1 as a component of CBL Mariner 1.0",
"product_id": "16820-4"
},
"product_reference": "4",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 golang 1.15.13-1 as a component of CBL Mariner 1.0",
"product_id": "19049-16820"
},
"product_reference": "19049",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 python-tensorboard 2.16.2-2 as a component of Azure Linux 3.0",
"product_id": "17084-5"
},
"product_reference": "5",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-tensorboard 2.16.2-2 as a component of Azure Linux 3.0",
"product_id": "17021-17084"
},
"product_reference": "17021",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 python-tensorboard 2.11.0-3 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-tensorboard 2.11.0-3 as a component of Azure Linux 3.0",
"product_id": "19696-17084"
},
"product_reference": "19696",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-16845",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-3",
"17084-1"
]
}
],
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19049-16820",
"17021-17084",
"19696-17084"
],
"known_affected": [
"16820-4",
"17084-5",
"17084-2"
],
"known_not_affected": [
"17084-3",
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-16845 Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2020/msrc_cve-2020-16845.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2020-08-18T00:00:00.000Z",
"details": "1.15.13-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-4"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2020-08-18T00:00:00.000Z",
"details": "2.16.2-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-5",
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"16820-4",
"17084-5",
"17084-2"
]
}
],
"title": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs."
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.